Select Page

Category: Security

  • Architecture
  • Containers
  • patterns

Threat Modeling

Threat modeling is an effective tool used to understand the threat landscape within an enterprise network. Threat modeling is a security practice for the team to identify threats, attacks, and risks based on the existing...

Read More

OpenID Connect

OpenID Connect is a simple identity layer built on top of the OAuth 2.0 protocol. OpenID Connect is all about authentication while OAuth is an authorization protocol. In OAuth, authorization is delegated while in OpenID Connect,...

Read More


Three part series on JWT tokens Part 1: What is a JWT Token ( This post) Part 2: Creating a JWT token server in core 2.0 Part 3: Accessing and Consuming a JWT token protected service in Angular 5+.  JWT ( JSON Web Token...

Read More

OAuth 2.0 – Introduction

OAuth 2.0 is an open authorization standard designed to provide an authentication and authorization protocol for the web.It is a protocol that provides a framework to exchange authorization and authentication information between...

Read More