Cybersecurity | Cloud | DevelopmentWhich user execute a GPO which is granted to unpriviledged user? October 23, 2024 video Active DirectoryansweranswersAuthorizationgroup policyUser
Cybersecurity | Cloud | DevelopmentASP.NET Core Identity with .NET (Web API) and Angular (Part 1/3) May 11, 2024 video .NET Core.Net Frameworkangular tutorialangular tutorial for beginnersASP.NET Coreasp.net core authenticationasp.net core authorizationasp.net core identityasp.net core identity apiasp.net core identity tutorialasp.net core identity with angularasp.net core identity with jwtASP.NET Core Web APIAuthenticationAuthorizationcodequsjson web tokenjwt authjwt authenticationjwt authentication and authorizationlearn angularWeb APIwhat is .net
Cybersecurity | Cloud | DevelopmentAuthorization in Software S3 E5 – How Box Does Authorization February 14, 2024 video Auth0AuthorizationboxconstomerdatadevDevelopersdevsDropboxenterprisehow authorization worksHow tologinlogoutOktapodcastSecurityUsers
Cybersecurity | Cloud | DevelopmentАутентификация: Используем Facebook провайдер January 5, 2024 video .NET CoreASP.NET CoreAuthenticationAuthorizationbasicscalabongaclaimsEFEntityFrameworkexplanationfacebooklogingpermissionproviderrolestutorialавторизацияаутентификацияобучениеосновыпровайдерразрешенияролиутверждения
Cybersecurity | Cloud | DevelopmentSAML vs OAuth 2.0 🆔⌛ September 5, 2023 video API SecurityAuthenticationAuthentication ProtocolsAuthorizationAuthorization FrameworksIdentity and Access ManagementIdentity FederationIdentity ManagementIdentity Providersidentity verificationOAuth 2.0OAuth 2.0 Explainedoauth 2.0 tutorialsamlSAML ExplainedSAML TutorialSAML vs OAuth ComparisonSecurity StandardsSingle sign onSSO ProtocolsSSO vs OAuthweb application securityweb developmentweb security
Cybersecurity | Cloud | DevelopmentDave Hoerster on Azure Active Directory B2C [TECHNOLOGYANDFRIENDS 654] July 31, 2023 video AADActive DirectoryAuthenticationAuthorizationazureB2CclaimscredentialsSecuritysoftwareTechnology
Cybersecurity | Cloud | DevelopmentID Tokens VS Access Tokens: What’s the Difference? June 26, 2023 video access tokensAuth0authentication vs authorizationAuthorizationbasicsdeveloperfor dummieshow to use an access tokenid tokensid tokens vs access tokensidentityjames quickjson web tokenjson web token authenticationjwt token tutorialloginOAuth2Oktaokta devopenid and oauth 2.0OpenID Connectopenid connect tutorialopenid connect vs oauth2secure applicationsSecuritywhat is a tokenwhere do I get an accesss tokenwhere do I get an id token
Cybersecurity | Cloud | DevelopmentIdentity Use and Identity Lifecycle April 3, 2023 video Access Controlattribute-basedAuthenticationAuthorizationbiometricbiometricscognitivedeprovisioningdiscretionaryerrorsfactorsidentificationidentityIIIIImandatoryone-timeOTPpampasswordsprivileged access managementRBACrole-basedrule-basedsecret questionssign-onsignonSingletypeVerification
Cybersecurity | Cloud | DevelopmentSecuring Vaadin apps with Spring Security and Keycloak (best practices) March 6, 2023 video Authorizationbest practicescsrfhttpInjectionKeyCloakOIDCSingle sign onspringSpring SecuritySSOtutorialuser based authorizationVaadinxss
Cybersecurity | Cloud | DevelopmentIAM in AWS | Introduction IAM | How IAM Works | Episode 08 December 4, 2022 video AmazonAuthenticationAuthorizationAWScloudCloud ComputingHow IAM WorksIAMIdentity and Access Managementitsmarttraining