Access Granted: Demystifying the identity options | Matt Goldman

How do you manage access to the applications you build? When it comes to securing your software, it’s easy to get overwhelmed by the vast number of options available, and confused by the sheer volume of information; not to mention often poor documentation. ‘Identification’, ‘authentication’, ‘authorisation’; ‘claims’, ‘roles’, ‘tokens’; ‘OpenID’, ‘OAuth’, ‘B2C’, ‘Auth0’. Ever wondered…

Read More