Found 114 presentations matching your search
Learn about the basics of OAuth 2.0 and the different OAuth flows in this introductory video. Unders...
OAuth 2.0 and OpenID Connect presentation
oidc concept
Testing has become essential in software development, offering benefits in debugging and deployment....
OAuth tokens are the new crown jewels. Once issued, they bypass MFA and give API-level access that i...
Discover how businesses can secure API using OAuth2 while thriving in the rapidly growing API econom...
The OAuth 2.0 authorization framework is a protocol that allows a user to grant a third-party web si...
Identity & Access Management (IAM) is the backbone of Zero Trust, cloud security, and compliance...
The Web is going social and the Social Web is going open--come and learn the latest ways to build yo...
The Salesforce platform offers system as well as application level security capabilities for buildin...
msInvader is an adversary simulation tool built for blue teams, designed to simulate adversary techn...
SMART on FHIR provides a standard, universal API for accessing EHI. The end-goal is to ensure that p...
All Day DevOps 2024
El desarrollo de APIs en las empresas es muy importante hoy en día. Poder exponer estas APIs no sol...
CloudNativeSecurityCon North America 2024
Big Data tools are becoming a critical part of enterprise architectures and as such securing the dat...
Session #1 of 5- Integration Architect Certification Prep Study Group
Presented at Techorama NL 2024
FamilySearch DevCon Presentation
We love developing applications, but sometimes we overlook critical security aspects, especially in ...
Integrating SharePoint with FME can open up a world of possibilities, from automating repetitive tas...
authentication of device