TonyMagically use environment variables without a .env fileTLDR: You can build or use a pre-made CLI together with your application’s start command to inject environment variables at start and…May 18, 20231May 18, 20231
Sagara GunathungaHow do you discover the OAuth2 server configuration?This is the 2nd post of my blog series about the OAuth2; reading the first post may help you to understand this current topic easily.Apr 24, 2020Apr 24, 2020
Sagara GunathungaHow to register and manage OAuth2 clients?In the first post of this blog series about the OAuth2, I provided a comprehensive overview of the OAuth2 core specification and its…Apr 19, 20211Apr 19, 20211
Sagara GunathungaUnderstanding OAuth2 LandscapeNow it has been nearly 8 years after the formal approval of OAuth2 Core standard by IETF. Obviously, the OAuth2 is not a new technology…Apr 19, 2020Apr 19, 2020
Jack KnutsonSetting up Google Authenticator on Multiple DevicesHaving a secondary device with your 2FA is a great way to have a backup in case of an emergency and for the added peace of mind.Mar 29, 20197Mar 29, 20197
Peter McDonaldHow I Setup My SSH HoneypotA few weeks ago I became curious as to what types of credentials were being attempted on SSH. I came up with the idea of creating a…Feb 24, 2019Feb 24, 2019
Sarthak KumarDjango : Two Factor AuthenticationTwo-factor (2FA) or multi-factor authentication (MFA) is an additional security layer for your business — helping to address the…Oct 25, 20196Oct 25, 20196
InThe StartupbyJulian RunnelsSetting up a Private Password Vault in 5 Minutes with DockerInstalling a self-hosted and secure Bitwarden instance to take ownership of your dataApr 17, 202012Apr 17, 202012