How do you manage access to the applications you build? When it comes to securing your software, it’s easy to get overwhelmed by the vast number of options available, and confused by the sheer volume of information; not to mention often poor documentation.
‘Identification’, ‘authentication’, ‘authorisation’; ‘claims’, ‘roles’, ‘tokens’; ‘OpenID’, ‘OAuth’, ‘B2C’, ‘Auth0’.
Ever wondered what all these mean or how they fit together?
Access granted: you are now authorised to hear Matt cut through the confusion, explain these terms, and show you how to untangle them to choose the right identity option for your solution. See them in action working through different scenarios, from simple proof of concepts, through to corporate enterprise solutions and public facing consumer apps.
About the speakers
Drawing on a combination of hands-on experience and enterprise governance practices, Matt is able to make connections between business and technology to deliver user and business focused outcomes.
Matt has worked in IT for 15 years, with a background in infrastructure and management, and has delivered security policies, IT strategies and disaster recovery plans to a number of high profile national and multi-national clients.
Throughout his career Matt has enjoyed scripting and programming and used these skills to enhance his work in other areas, but has now turned to developing software full-time, specialising in .NET Core, Angular, Xamarin and Azure as well as security and authentication.
Power Automate lets power users automate away repeatable manual processes. They can go from zero to hero in under a day!
It’s important for all your SharePoint Sites to be as consistent as possible.
In the days of classic SharePoint, subsites were a popular way of organising your intranet. Modern SharePoint architecture leans toward a flatter hierarchy, where sub-sites are generally not recommended.
Not finding stuff you have permissions to is super frustrating. So this one has always confused us…. Do you consider it a bug?
Having inconsistent resource names across projects creates all sorts of pain:
– Struggling to identify resources
– Unsure what to label new resources.
– Risk of duplicating resources
In this talk, Jason Taylor will demonstrate an approach using permission-based authorization to overcome these limitations by building a flexible approach to managing roles and permissions from within your system. This will improve the maintainability and visibility of access control across your system. Putting the power into the hands of application users and administrators, rather than developers.
On the 4th of February we welcomed everyone back to the office with a fantastic lunch! 🥗
It has been a roller coaster 12 months with restrictions, so it was amazing to see everyone back in the office working side by side again 👏
Join Adam as he delivers the latest Tech News during our March User Group.
Our development team spent a few months working really hard on this new product, and Chief Architect Adam Cogan is officially launching it today.
Do you know the security best practices for both end-users and SysAdmins?
Join Adam for the 10 tips CEOs must know for both end-users and SysAdmins.
Learn from Patrick how valuable Ocelot is and see the ins and outs of building an API gateway and protect the services using Azure VNet.