Cybersecurity | Cloud | DevelopmentIterative Architecture: A Pragmatic Approach to Digital Transformation, WSO2Con USA 2017 March 23, 2024 video analyticsapi managementAPI ManagerCloud ComputingDigital Transformationidentityintegrationinternet of thingsIoTIterative ArchitecturemiddlewareOpen SourcePragmatic Approachsan franciscoSecurityservice-oriented-architectureSOAwso2wso2conWSO2Con USA 2017
Cybersecurity | Cloud | DevelopmentKeynote: Take Control of Identity – Devday 2023 March 11, 2024 video appAuth0cloud identitycloud identity summitCloud Securitycloud security communitycustomer identitydevdevice securityDigital Identitydigital securityidentityIdentity and Access Managementidentity governanceIdentity Managementidentity securityintelligent securityKeynoteloginnanolock securityopening keynoteping identitysecureSecuritysecurity (software)security as a servicesecurity essentialsworkforce identityzero trust security
Cybersecurity | Cloud | DevelopmentConfigure SSO to Sharepoint with Salesforce as an IdP without using ADFS 2.0. Is this possible? November 9, 2023 video identityquestionsalessalesforceSingle sign onSolutionSolutions
Cybersecurity | Cloud | DevelopmentIOTA Experience Identity Meeting 26.07.2021 November 2, 2023 video experienceidentityIOTAMeetingOpen SourceSelf Sovereign IdentitySSITangleX-Team
Cybersecurity | Cloud | DevelopmentHow to Easily Parse and Validate JSON Web Tokens (JWTs) in Python October 14, 2023 video access tokensAuth0how to create JWT in Pythonhow to create jwt with rs256 in pythonhow to decode JWT in Pythonhow to encode JWT in Pythonhow to make jothow to sign jwt with rs256 in pythonhow to verify JWT in Pythonhs256identityjotJSON Web Token in PythonJSON Web Tokensjson web tokens tutorialJWTJWT in Pythonjwt tutorialOktaokta devparsingpyjwtpythonpython 3python tutorialrs256Securityvalidating jotsweb development
Cybersecurity | Cloud | DevelopmentReference Types, Equality, and Object Identity September 28, 2023 video Data TypeidentityJava (programming Language)java programmingobjectReference TypesoftwareSystemTechnology
Cybersecurity | Cloud | DevelopmentIntroduction to Google Sign-In for Websites September 17, 2023 video chromeDevelopersfullname: Eiji KitamuraGDS: Full ProductiongoogleGoogle Sign-InidentityLocation: otherOAuthOpenID Connectproduct: chromeTeam: Scalable AdvocacyType: DevByteweb
Cybersecurity | Cloud | DevelopmentGetting Started with Spring Boot and SAML August 24, 2023 video adding samlAuth0Authenticationdeveloperhands-on tutorialHow toidentityIdentity FederationIdentity ManagementIdentity Provideridentity verificationJavajsmatt raibleOktasamlSAML attributesscreencastsecuirtysecure authenticationsecure authorizationSecure Loginsecuring your appsSecuritySecurity Assertion Markup Languageservice providerSingle sign onspring bootspring boot 3Spring SecuritySSOtutorialweb developmentweb security
Cybersecurity | Cloud | DevelopmentLinear Function Tutorial 18 find line equation using Parallel and Perpendicular identity August 23, 2023 video AlwaysComputeridentityjinghua educationLine (Literature Subject)Linear Function (Literature Subject)MathMathematics (Field Of Study)ParallelPerpendicularPort Coquitlam (City/Town/Village)robotTechnologyTutor (Profession)Way
Cybersecurity | Cloud | DevelopmentID Tokens VS Access Tokens: What’s the Difference? June 26, 2023 video access tokensAuth0authentication vs authorizationAuthorizationbasicsdeveloperfor dummieshow to use an access tokenid tokensid tokens vs access tokensidentityjames quickjson web tokenjson web token authenticationjwt token tutorialloginOAuth2Oktaokta devopenid and oauth 2.0OpenID Connectopenid connect tutorialopenid connect vs oauth2secure applicationsSecuritywhat is a tokenwhere do I get an accesss tokenwhere do I get an id token