DEV Community

# identity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introduction to SSO with the IAM Identity Center and Entra ID

Introduction to SSO with the IAM Identity Center and Entra ID

5
Comments 2
4 min read
Introducing GIM: Revolutionizing Identity Management with AI and PHP

Introducing GIM: Revolutionizing Identity Management with AI and PHP

Comments
2 min read
9 Things You Didn't Know About Decentralized Identifiers

9 Things You Didn't Know About Decentralized Identifiers

8
Comments 2
7 min read
Azure Managed Identities: No more secrets

Azure Managed Identities: No more secrets

1
Comments
4 min read
How JSON Web Tokens Power Mobile Driver's Licenses

How JSON Web Tokens Power Mobile Driver's Licenses

15
Comments
11 min read
Mastering Authentication & Authorization: Exploring Identity Framework with .NET 8 and Migrations

Mastering Authentication & Authorization: Exploring Identity Framework with .NET 8 and Migrations

Comments
5 min read
Angular 17 & .NET 8 JWT Authentication 🔐 - Login | AuthService - Part 5

Angular 17 & .NET 8 JWT Authentication 🔐 - Login | AuthService - Part 5

Comments
1 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

5
Comments
8 min read
Sailpoint Identity IQ Training|Sailpoint Online Training

Sailpoint Identity IQ Training|Sailpoint Online Training

Comments
2 min read
Unleashing the Power of Azure Managed Identities for Seamless Integration

Unleashing the Power of Azure Managed Identities for Seamless Integration

Comments
2 min read
Cognito Starter Kit with Rust and Lambda

Cognito Starter Kit with Rust and Lambda

11
Comments
10 min read
IndieFediWebVerse

IndieFediWebVerse

1
Comments
4 min read
Hexo, WebFinger and better discoverability

Hexo, WebFinger and better discoverability

Comments
4 min read
Exploring the Horizon of Digital Identity: The Concept of Encrypted-Sovereign Credentials (ENSC)

Exploring the Horizon of Digital Identity: The Concept of Encrypted-Sovereign Credentials (ENSC)

Comments 2
6 min read
A Digital Toast: My Encounter with Louisiana's Mobile Driver's License

A Digital Toast: My Encounter with Louisiana's Mobile Driver's License

16
Comments
2 min read
Structured Security in Blazor: Exploring Logic-Driven Authorization

Structured Security in Blazor: Exploring Logic-Driven Authorization

Comments
3 min read
Explorando la Autenticación Bearer en ASP.NET Core 8

Explorando la Autenticación Bearer en ASP.NET Core 8

8
Comments
5 min read
X-Ray.contact - Access in-depth data about people from open sources

X-Ray.contact - Access in-depth data about people from open sources

Comments
1 min read
“Unleashing the Full Power of the Internet with a VPN”

“Unleashing the Full Power of the Internet with a VPN”

Comments
3 min read
Identity as a Service (IDaaS): The Future of Secure and Convenient Authentication

Identity as a Service (IDaaS): The Future of Secure and Convenient Authentication

Comments
11 min read
Who Really Owns Your Social Media Handles?

Who Really Owns Your Social Media Handles?

5
Comments 4
3 min read
Authentication With Web5

Authentication With Web5

1
Comments
4 min read
Understanding JWKS (JSON Web Key Set)

Understanding JWKS (JSON Web Key Set)

1
Comments
3 min read
Decentralized Identity in the Real World

Decentralized Identity in the Real World

5
Comments
3 min read
How-to configure your first user with OpenShift IDP - htpasswd

How-to configure your first user with OpenShift IDP - htpasswd

Comments
2 min read
DB and understanding the relationship of the JOIN table

DB and understanding the relationship of the JOIN table

Comments
1 min read
IAM Users vs Roles

IAM Users vs Roles

4
Comments
12 min read
How to have separate staging and testing token enrichment process without creating another Azure AD B2C Tenant.

How to have separate staging and testing token enrichment process without creating another Azure AD B2C Tenant.

Comments
2 min read
Meta Identity Systems Reimagining Digital Identity Management with the Laws of Identity

Meta Identity Systems Reimagining Digital Identity Management with the Laws of Identity

Comments
3 min read
How Self Sovereign Identity Support Laws of Identity?

How Self Sovereign Identity Support Laws of Identity?

Comments
1 min read
Missed DID operation. How to prove DID ownership?

Missed DID operation. How to prove DID ownership?

Comments
2 min read
AIDs — Autonomous identifiers

AIDs — Autonomous identifiers

Comments
4 min read
Autonomous DIDs Identifiers for Organisations

Autonomous DIDs Identifiers for Organisations

Comments
5 min read
Decentralized Web Node

Decentralized Web Node

Comments
2 min read
В чем проблема Z-поколении. Мотивация зло? Цели?

В чем проблема Z-поколении. Мотивация зло? Цели?

Comments 3
1 min read
Understanding Role Assumption in AWS IAM for Enhanced Security and Access Management

Understanding Role Assumption in AWS IAM for Enhanced Security and Access Management

Comments
3 min read
Understanding Key SSO Protocols and Their Use Cases

Understanding Key SSO Protocols and Their Use Cases

Comments
7 min read
Identity and Access Management in Multi-Cloud Environments

Identity and Access Management in Multi-Cloud Environments

4
Comments
5 min read
Developer Tools related to Decentralized Identity

Developer Tools related to Decentralized Identity

Comments
1 min read
How to write good IDs, generally

How to write good IDs, generally

Comments
5 min read
Who am I in AWS? Presenting IAM STS get-caller-identity

Who am I in AWS? Presenting IAM STS get-caller-identity

Comments
5 min read
Why you need a centralized identity system for a multi-app business

Why you need a centralized identity system for a multi-app business

11
Comments
4 min read
What is Phone Number Trustworthiness?

What is Phone Number Trustworthiness?

3
Comments
4 min read
Google One Tap login with Auth0

Google One Tap login with Auth0

Comments
3 min read
What is Single Sign-on, OpenID, SAML and OAuth How can they be used together

What is Single Sign-on, OpenID, SAML and OAuth How can they be used together

Comments
5 min read
Top 5 Auth0 Alternatives for SSO

Top 5 Auth0 Alternatives for SSO

1
Comments
9 min read
Features and Best practices of a robust user management

Features and Best practices of a robust user management

Comments
11 min read
Announcing GaitAuth™

Announcing GaitAuth™

1
Comments 3
3 min read
IAM policies and Service Control Policies (SCPs): How to master and secure access and permissions in an AWS Landing Zone

IAM policies and Service Control Policies (SCPs): How to master and secure access and permissions in an AWS Landing Zone

Comments
10 min read
Encrypt and Decrypt users' data in ASP.NET Core Identity using the ILookupProtector and ILookupProtectorKeyRing interfaces

Encrypt and Decrypt users' data in ASP.NET Core Identity using the ILookupProtector and ILookupProtectorKeyRing interfaces

3
Comments 2
6 min read
Introducing the Venus Upgrade: A New Era for Sonr

Introducing the Venus Upgrade: A New Era for Sonr

Comments
2 min read
Implementing PAM: Step-by-step Guide For Better Cyber Security

Implementing PAM: Step-by-step Guide For Better Cyber Security

Comments
6 min read
AZ-104: Microsoft Azure Administrator Preparation (Part 1)

AZ-104: Microsoft Azure Administrator Preparation (Part 1)

1
Comments
9 min read
Identity Wallet Concept

Identity Wallet Concept

Comments
4 min read
A Beginner's Guide to AWS Identity and Access Management (IAM)

A Beginner's Guide to AWS Identity and Access Management (IAM)

9
Comments 1
4 min read
Creating Cognito User with Auto-Incrementing ID

Creating Cognito User with Auto-Incrementing ID

2
Comments
6 min read
3 Digital Identity Trends Developers Should Know About

3 Digital Identity Trends Developers Should Know About

5
Comments 3
4 min read
Identity as a service: Leveraging AWS tools for secure identity management

Identity as a service: Leveraging AWS tools for secure identity management

1
Comments
3 min read
Fixing botocore.exceptions.nocredentialserror: unable to locate credentials [SOLVED]

Fixing botocore.exceptions.nocredentialserror: unable to locate credentials [SOLVED]

Comments
5 min read
Great Analogy To Explain ID Tokens Vs Access Tokens

Great Analogy To Explain ID Tokens Vs Access Tokens

1
Comments
2 min read
loading...