DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Software An OAuth protected platform (Nordic APIS April 2014)

1. An OAuth-protected API Platform for Private, Partner & Public Use By Travis Spencer, CEO! @travisspencer / @2botech 2. Copyright 2014 Twobo Technologies AB @travisspencer…

Technology Getting Into Mobile w/o Getting Into Trouble - Greg Kliewer, Sr Solutions Strategist, CA...

1. Getting Into MobileWithout Getting Into TroubleGreg KliewerSenior Solutions StrategistOctober, 2014 2. 2© 2014 CA. ALL RIGHTS RESERVED.The good old daysNetwork…

Software Stateless authentication for microservices

@alvaro_sanchez Stateless authentication for microservices Álvaro Sánchez-Mariscal Web Architect - @alvaro_sanchez About me ● Passionate Software Developer. ● Worked…

Software Stateless authentication for microservices - Greach 2015

@alvaro_sanchez Stateless authentication for microservices Álvaro Sánchez-Mariscal Web Architect - @alvaro_sanchez About me ● Passionate Software Developer. ○ Former…

Technology Identity for IoT: An Authentication Framework for the IoT

AN AUTHENTICATION FRAMEWORK FOR THE IOT John Bradley Copyright © 2014 Ping Identity Corp. All rights reserved. 1 Premise Copyright © 2014 Ping Identity Corp. All rights…

Technology Learn with WSO2 - API Security

Prabath Siriwardena •  Exposing  business  functionality  to  the  rest  of  the  world.   •  Private  APIs  vs.  Public  APIs   •  Securing,  Throttling,…

Software Stateless authentication for microservices - GR8Conf 2015

1. @alvaro_sanchez Stateless authentication for microservices @alvaro_sanchez Álvaro Sánchez-Mariscal - Web Architect 2. @alvaro_sanchez About me ● Passionate Software…

Software APIs: The Bridge to IoT

1. APIs : The Bridge to IoT Asanka Abeysinghe Vice President, Solutions Architecture - WSO2,Inc 2. 2 3. Trip to Sri Lanka 3 4. Connect everything to anything. 4 5. 5 6. Connecting…

Technology 2015 06-api days-sf-apis-dbridge2iot-asanka

1. APIs : The Bridge to IoT Asanka Abeysinghe Vice President, Solutions Architecture - WSO2,Inc 2. 2 3. Trip to Sri Lanka 3 4. Connect everything to anything. 4 5. 5 6. Connecting…

Technology CIS 2015 OpenID Connect and Mobile Applications - David Chase

1. OpenID Connect and Mobile Applications David Chase 2. Implicit •  When using the Implicit Flow, all tokens are returned from the Authorization Endpoint; the Token…