Application Front-Ends Must Not Make Authorization Decisions
First, let’s get the usual introductions out of the way. For an in-depth discussion of what Authorization is, check out[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
First, let’s get the usual introductions out of the way. For an in-depth discussion of what Authorization is, check out[…]
Read moreFront / Mark Wilson Sometimes at client sites, I see a separation of APIs advertised on an API Gateway based[…]
Read moreTokens / SHYCITYNikon For anyone who has been paying attention, this blog post has been a long-time coming for multiple[…]
Read morebackwater / Adedotun Ajibade This blog post continues our discussion of Authorization in the API space. It will explore common[…]
Read morepalmgroove / Adedotun Ajibade Introduction This blog post expands on delegation and related concepts introduced in my Kerberos Delegation blog[…]
Read moreNature Art / mynikfoto In this next post in the Kerberos and Windows Security Series, we are going to explore[…]
Read moreGrain / Kamil Porembiński The use of HTTP POST vs HTTP GET for read-only (or query) operations in REST APIs[…]
Read moreAnkor Wat / Rob Tiggelman There are several approaches to securing APIs. Every API Gateway vendor supports the same core[…]
Read moreThere are many ways to implement user authentication in a modern application (mobile, desktop, tablet, web, etc). I have previously[…]
Read morePattern / Vinoth Chandar I recently finished implementing OAuth2 and OIDC support for Azure Active Directory in my OAuth2 + OIDC[…]
Read more