With Pomerium, OAuth2 configuration becomes a breeze. Simply configure your routes, and Pomerium handles the upstream OAuth flow, ensuring tokens never leave the gateway for enhanced security. A definite win for developer experience! #OAuth2 #security


oauth2-proxy Protect your web apps with OAuth2 / OIDC auth using OAuth2-Proxy, a flexible & open-source reverse proxy/middleware. Supports multiple providers & extracts user details #oauth2proxy #oauth2 #security

D4Vinci1's tweet image. oauth2-proxy

Protect your web apps with OAuth2 / OIDC auth using OAuth2-Proxy, a flexible & open-source reverse proxy/middleware. Supports multiple providers & extracts user details #oauth2proxy #oauth2 #security

Secure your applications with OAuth 2.0 and Spring Security! Learn how these powerful tools protect your data and users. #CyberSecurityAwareness #OAuth2 #Spring brcm.tech/4nPmGlu

VMwareTanzu's tweet image. Secure your applications with OAuth 2.0 and Spring Security! Learn how these powerful tools protect your data and users. #CyberSecurityAwareness #OAuth2 #Spring brcm.tech/4nPmGlu

Congratulations to Sh Jaimandeep Singh for successfully defending his PhD thesis during the viva voce on 21.08.2024. He carried out his research on Secure Design, Architecture and Configuration of authorisation protocols with emphasis on OAuth 2.0. @NFSU_Official #OAuth2.0

NvinChaudhary's tweet image. Congratulations to Sh Jaimandeep Singh for  successfully defending his PhD thesis during the viva voce on 21.08.2024. He carried out his research on Secure Design, Architecture and Configuration of authorisation protocols with emphasis on OAuth 2.0.
@NFSU_Official
#OAuth2.0
NvinChaudhary's tweet image. Congratulations to Sh Jaimandeep Singh for  successfully defending his PhD thesis during the viva voce on 21.08.2024. He carried out his research on Secure Design, Architecture and Configuration of authorisation protocols with emphasis on OAuth 2.0.
@NFSU_Official
#OAuth2.0

Day 11 of #100DaysOfCode 🚀 Worked on OAuth2 authentication in Spring Boot: ✅ Authorization Code flow ✅ Securing routes with Spring Security ✅ Bearer & refresh tokens A big step in understanding how modern apps secure their communications. #100DaysOfCode #Oauth2

clairedeborahN's tweet image. Day 11 of #100DaysOfCode 🚀

Worked on OAuth2 authentication in Spring Boot:
✅ Authorization Code flow
✅ Securing routes with Spring Security
✅ Bearer & refresh tokens
A big step in understanding how modern apps secure their communications.

#100DaysOfCode #Oauth2

Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀 Built a REST API & learned proper naming conventions FastAPI auto-validates requests with Pydantic Used @field_validator for custom error messages 📌 Explored OAuth2.0 with OpenID Connect for authentication 🔐 #FastAPI #OAuth2 #OpenID

Dunique314's tweet image. Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀

Built a REST API & learned proper naming conventions
FastAPI auto-validates requests with Pydantic
Used @field_validator for custom error messages 📌
Explored OAuth2.0 with OpenID Connect for authentication 🔐
#FastAPI #OAuth2 #OpenID
Dunique314's tweet image. Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀

Built a REST API & learned proper naming conventions
FastAPI auto-validates requests with Pydantic
Used @field_validator for custom error messages 📌
Explored OAuth2.0 with OpenID Connect for authentication 🔐
#FastAPI #OAuth2 #OpenID
Dunique314's tweet image. Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀

Built a REST API & learned proper naming conventions
FastAPI auto-validates requests with Pydantic
Used @field_validator for custom error messages 📌
Explored OAuth2.0 with OpenID Connect for authentication 🔐
#FastAPI #OAuth2 #OpenID

And in a couple of minutes, a good talk about #OAuth2 to start the streak! All talks can be followed live here: bdxio.fr/live (this one's in French) @bdxio

paulmolin42's tweet image. And in a couple of minutes, a good talk about #OAuth2 to start the streak!
All talks can be followed live here: bdxio.fr/live (this one's in French) @bdxio

Think JWTs are always the right choice? 🤔 In this myth-busting post, #Auth0’s @andychiare debunks 5 common JWT misconceptions: 🔑 #JWT ≠ access token 👀 Readable ≠ insecure ✅ Signed ≠ safe 🔐 JWT ≠ session 🔄 Revocation is hard 🔗 bit.ly/3J2OpPX #OAuth2 #DevSec

auth0's tweet image. Think JWTs are always the right choice? 🤔
In this myth-busting post, #Auth0’s @andychiare debunks 5 common JWT misconceptions:

🔑 #JWT ≠ access token
👀 Readable ≠ insecure
✅ Signed ≠ safe
🔐 JWT ≠ session
🔄 Revocation is hard
🔗 bit.ly/3J2OpPX

#OAuth2 #DevSec

OAuth 2.0 is the backbone of secure API access Here's the breakdown: - Grant types: Auth Code, Implicit, Client Credentials... - Core concepts: Tokens, Resource Owner, Auth Server - Security tips - OpenID Connect: for user identity A great visual by MasteringBackend. #OAuth2

master_backend's tweet image. OAuth 2.0 is the backbone of secure API access

Here's the breakdown:
- Grant types: Auth Code, Implicit, Client Credentials...
- Core concepts: Tokens, Resource Owner, Auth Server
- Security tips
- OpenID Connect: for user identity

A great visual by MasteringBackend.

#OAuth2

To enhance security, Microsoft will end support for Basic Authentication on Sep 16, 2024. Outlook, Hotmail, and Live users must switch to Modern Authentication (OAuth 2.0) to keep inbox access. Use apps like Mailbird to stay connected. #Microsoft #ModernAuthentication #OAuth2

mailbird's tweet image. To enhance security, Microsoft will end support for Basic Authentication on Sep 16, 2024. Outlook, Hotmail, and Live users must switch to Modern Authentication (OAuth 2.0) to keep inbox access.

Use apps like Mailbird to stay connected. #Microsoft #ModernAuthentication #OAuth2

🔒 Want to level up your API security game? This guide covers the full spectrum — HTTPS, OAuth2, mTLS, scopes, throttling, and more — with practical how-tos using WSO2 API Manager. 📘 Dive in: tinyurl.com/yhwum94f #APIsecurity #WSO2 #OAuth2 #mTLS #APImanagement

wso2's tweet image. 🔒 Want to level up your API security game?
This guide covers the full spectrum — HTTPS, OAuth2, mTLS, scopes, throttling, and more — with practical how-tos using WSO2 API Manager.
📘 Dive in: tinyurl.com/yhwum94f

#APIsecurity #WSO2 #OAuth2 #mTLS #APImanagement

OAuth2 with Node.js — a visual guide OAuth2 lets apps access user data securely without credentials. This image walks you through: - Picking libraries like passport - Implementing token exchange - Validating tokens & handling refresh - Build secure apps with Node.js #OAuth2

master_backend's tweet image. OAuth2 with Node.js — a visual guide
OAuth2 lets apps access user data securely without credentials.

This image walks you through:
- Picking libraries like passport
- Implementing token exchange
- Validating tokens & handling refresh
- Build secure apps with Node.js

#OAuth2

🚀 Just implemented Google OAuth2 in Django! 🔐 Seamlessly fetching user data and handling tokens like a pro. 🛡️ Here's a sneak peek into the code that makes it all happen! 💻 #Django #OAuth2 #GoogleAuth #BackendDeveloper #Python #DevLife #Coding #Connect #Programming

Meek_emma007's tweet image. 🚀 Just implemented Google OAuth2 in Django! 🔐 Seamlessly fetching user data and handling tokens like a pro. 🛡️ Here's a sneak peek into the code that makes it all happen! 💻 #Django #OAuth2 #GoogleAuth #BackendDeveloper #Python #DevLife #Coding #Connect #Programming

✨ JWT + Spring Security = scalable, secure, and standards-based API protection. #OAuth2 #SpringBoot


🛡️ Use OAuth 2.0 for secure authentication. How-To: Implement OAuth 2.0 to provide secure and scalable user authentication for your web and mobile applications. #OAuth2 #SecureAuthentication #SmartSnippet #AllDayDSK


OAuth 2.0 Authorization Flow with Dropbox API and Postman #oauth2 #postman morioh.com/p/208d2916ede6…


I've published a new article on implementing PKCE with Keycloak using the passport-keycloak-oauth2-oidc-portable library. blog.brakmic.com/pkce-with-keyc… #OAuth2 #Keycloak #PKCE

brakmic's tweet image. I've published a new article on implementing PKCE with Keycloak using the passport-keycloak-oauth2-oidc-portable library.

blog.brakmic.com/pkce-with-keyc…

#OAuth2 #Keycloak #PKCE
brakmic's tweet image. I've published a new article on implementing PKCE with Keycloak using the passport-keycloak-oauth2-oidc-portable library.

blog.brakmic.com/pkce-with-keyc…

#OAuth2 #Keycloak #PKCE
brakmic's tweet image. I've published a new article on implementing PKCE with Keycloak using the passport-keycloak-oauth2-oidc-portable library.

blog.brakmic.com/pkce-with-keyc…

#OAuth2 #Keycloak #PKCE

Implemented Google & GitHub login in my Spring Boot project! 🔒💻 Learned OAuth2 integration, secure authentication, and seamless social login flows. #Java #SpringBoot #OAuth2 #FullStack #BackendDevelopment

Ansh_Gupta20's tweet image. Implemented Google & GitHub login in my Spring Boot project! 🔒💻
Learned OAuth2 integration, secure authentication, and seamless social login flows.
#Java #SpringBoot #OAuth2 #FullStack #BackendDevelopment

OAuth 2.0’s Authorization Code Flow 🔐 The smart way apps borrow access—not passwords. Secure, simple, and everywhere you log in. 🚀 #OAuth2 #CyberSecurity #WebDev blog.alphaprep.net/comparing-and-…


OAuth 2.0’s Authorization Code Flow 🔑 The secret handshake behind those “Log in with…” buttons—secure, sleek, and password-free. 🚀 #OAuth2 #CyberSecurity #DevLife blog.alphaprep.net/compare-and-co…


OAuth 2.0’s Authorization Code Flow 🔐 The smooth, secure way apps access your data—no passwords exposed, just pure token magic.✨ #OAuth2 #CyberSecurity #DevLife blog.alphaprep.net/access-control…


Secure your applications with OAuth 2.0 and Spring Security! Learn how these powerful tools protect your data and users. #CyberSecurityAwareness #OAuth2 #Spring brcm.tech/4nPmGlu

VMwareTanzu's tweet image. Secure your applications with OAuth 2.0 and Spring Security! Learn how these powerful tools protect your data and users. #CyberSecurityAwareness #OAuth2 #Spring brcm.tech/4nPmGlu

OAuth 2.0’s Authorization Code Flow = apps get just the access they need, no passwords exposed. It’s your secure backstage pass 🔑🚪 #OAuth2 #CyberSecurity blog.alphaprep.net/ccna-200-301-i…


🔑 Core Config: java.oauth2Login(Customizer.withDefaults()) 💡 Tip: Use @ AuthenticationPrincipal OAuth2User to fetch user details. Complete code: github.com/patilvishi/spr… #SpringBoot #OAuth2 #GoogleLogin #Java


🚀 Springboot OAuth2 Login with Google Let users log in securely using their Google account. 🧠 Learn: - Add OAuth2 Client dependency - Configure Google credentials - Display user profile info #SpringBoot #OAuth2 #GoogleLogin #Java


Day 11 of #100DaysOfCode 🚀 Worked on OAuth2 authentication in Spring Boot: ✅ Authorization Code flow ✅ Securing routes with Spring Security ✅ Bearer & refresh tokens A big step in understanding how modern apps secure their communications. #100DaysOfCode #Oauth2

clairedeborahN's tweet image. Day 11 of #100DaysOfCode 🚀

Worked on OAuth2 authentication in Spring Boot:
✅ Authorization Code flow
✅ Securing routes with Spring Security
✅ Bearer & refresh tokens
A big step in understanding how modern apps secure their communications.

#100DaysOfCode #Oauth2

🧭 Cross App Access がヤバい “同意いらず(ノーコンセント)で IdP がアプリ間接続を仲裁”。ID-JAG(紹介状JWT)→ Token Exchange → JWT Bearerで許可外APIを中央管理で停止。 図解&具体手順👇 zenn.dev/naokky/article… #OAuth2 #Okta #XAA


OAuth 2.0 Authorization Code Flow = apps get a backstage pass 🎟️ without your password. Secure, scoped, and smooth. 🔐 #OAuth2 #AppSecurity blog.alphaprep.net/securing-netwo…


With Pomerium, OAuth2 configuration becomes a breeze. Simply configure your routes, and Pomerium handles the upstream OAuth flow, ensuring tokens never leave the gateway for enhanced security. A definite win for developer experience! #OAuth2 #security


Hi Folks, I spent my Sunday playing with: - #Storyblok custom applications - #Oauth2 - #LaravelSocialite - #LaravelLivewire - #MaryUI (#tailwindcss + #daisyui)

RmeetsH's tweet image. Hi Folks, I spent my Sunday playing with:
- #Storyblok custom applications
- #Oauth2
- #LaravelSocialite
- #LaravelLivewire
- #MaryUI (#tailwindcss + #daisyui)

OAuth 2.0 is an authorization protocol often used to secure access to APIs. Here's what you need to know, from an API hacker's perspective. #api #oauth2 #apihacking #hackingtools zerodayhacker.com/what-is-oauth-…

EdwardLichtner's tweet image. OAuth 2.0 is an authorization protocol often used to secure access to APIs. Here's what you need to know, from an API hacker's perspective.
#api #oauth2 #apihacking #hackingtools 
zerodayhacker.com/what-is-oauth-…

OAuth 2.0 - Securely connect apps without sharing passwords. - Simplify logins, share access, stay in control. Your data, safeguarded. Read about OAuth2.0 in this short and colorful flyer. #OAuth2 #SecureConnections

sec_r0's tweet image. OAuth 2.0

- Securely connect apps without sharing passwords. 
- Simplify logins, share access, stay in control. 

Your data, safeguarded. 
Read about OAuth2.0 in this short and colorful flyer. 

#OAuth2 #SecureConnections

oauth2-proxy Protect your web apps with OAuth2 / OIDC auth using OAuth2-Proxy, a flexible & open-source reverse proxy/middleware. Supports multiple providers & extracts user details #oauth2proxy #oauth2 #security

D4Vinci1's tweet image. oauth2-proxy

Protect your web apps with OAuth2 / OIDC auth using OAuth2-Proxy, a flexible & open-source reverse proxy/middleware. Supports multiple providers & extracts user details #oauth2proxy #oauth2 #security

The main components of the OAuth2 architecture #OAuth2 #programming

MoisesGamio's tweet image. The main components of the OAuth2 architecture
#OAuth2 #programming

Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀 Built a REST API & learned proper naming conventions FastAPI auto-validates requests with Pydantic Used @field_validator for custom error messages 📌 Explored OAuth2.0 with OpenID Connect for authentication 🔐 #FastAPI #OAuth2 #OpenID

Dunique314's tweet image. Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀

Built a REST API & learned proper naming conventions
FastAPI auto-validates requests with Pydantic
Used @field_validator for custom error messages 📌
Explored OAuth2.0 with OpenID Connect for authentication 🔐
#FastAPI #OAuth2 #OpenID
Dunique314's tweet image. Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀

Built a REST API & learned proper naming conventions
FastAPI auto-validates requests with Pydantic
Used @field_validator for custom error messages 📌
Explored OAuth2.0 with OpenID Connect for authentication 🔐
#FastAPI #OAuth2 #OpenID
Dunique314's tweet image. Day 2 - REST APIs & OAuth2.0 with FastAPI 🚀

Built a REST API & learned proper naming conventions
FastAPI auto-validates requests with Pydantic
Used @field_validator for custom error messages 📌
Explored OAuth2.0 with OpenID Connect for authentication 🔐
#FastAPI #OAuth2 #OpenID

Day 11 of #100DaysOfCode 🚀 Worked on OAuth2 authentication in Spring Boot: ✅ Authorization Code flow ✅ Securing routes with Spring Security ✅ Bearer & refresh tokens A big step in understanding how modern apps secure their communications. #100DaysOfCode #Oauth2

clairedeborahN's tweet image. Day 11 of #100DaysOfCode 🚀

Worked on OAuth2 authentication in Spring Boot:
✅ Authorization Code flow
✅ Securing routes with Spring Security
✅ Bearer & refresh tokens
A big step in understanding how modern apps secure their communications.

#100DaysOfCode #Oauth2

OAuth2 allows other websites/apps to access your account info without giving them your password. You give permission by clicking "Log in with" and authorise an authorization code exchange. It's secure and commonly used. #oauth2 #websecurity

AmigosCode's tweet image. OAuth2 allows other websites/apps to access your account info without giving them your password. You give permission by clicking "Log in with" and authorise an authorization code exchange. It's secure and commonly used. 

#oauth2 #websecurity

Secure your applications with OAuth 2.0 and Spring Security! Learn how these powerful tools protect your data and users. #CyberSecurityAwareness #OAuth2 #Spring brcm.tech/4nPmGlu

VMwareTanzu's tweet image. Secure your applications with OAuth 2.0 and Spring Security! Learn how these powerful tools protect your data and users. #CyberSecurityAwareness #OAuth2 #Spring brcm.tech/4nPmGlu

🔒🚀 Un super retour d’expérience d'@AmadeusITGroup à @RivieraDEV 🌴 👉 buff.ly/kGxPFvJ Un bel exemple concret d’intégration sécurité + dev dans la vie réelle 💡 #CloudNative #OAuth2 #CI #AppSecurity @CloudNativeFdn

microcksio's tweet image. 🔒🚀 Un super retour d’expérience d'@AmadeusITGroup à @RivieraDEV 🌴
👉 buff.ly/kGxPFvJ 

Un bel exemple concret d’intégration sécurité + dev dans la vie réelle 💡

#CloudNative #OAuth2 #CI #AppSecurity @CloudNativeFdn

Help me out here— in #oauth2 why does IdP first return an auth code to the app, and then app calls IdP to exchange the authorization code for an access token+refresh token? Why not return the access token + refresh token in step 7?

coltmcnealy's tweet image. Help me out here—

in #oauth2 why does IdP first return an auth code to the app, and then app calls IdP to exchange the authorization code for an access token+refresh token?

Why not return the access token + refresh token in step 7?

Congratulations to Sh Jaimandeep Singh for successfully defending his PhD thesis during the viva voce on 21.08.2024. He carried out his research on Secure Design, Architecture and Configuration of authorisation protocols with emphasis on OAuth 2.0. @NFSU_Official #OAuth2.0

NvinChaudhary's tweet image. Congratulations to Sh Jaimandeep Singh for  successfully defending his PhD thesis during the viva voce on 21.08.2024. He carried out his research on Secure Design, Architecture and Configuration of authorisation protocols with emphasis on OAuth 2.0.
@NFSU_Official
#OAuth2.0
NvinChaudhary's tweet image. Congratulations to Sh Jaimandeep Singh for  successfully defending his PhD thesis during the viva voce on 21.08.2024. He carried out his research on Secure Design, Architecture and Configuration of authorisation protocols with emphasis on OAuth 2.0.
@NFSU_Official
#OAuth2.0

This Saturday I will be speaking at #DefCon32 about OIDC misconfigurations and abuses in the context of CI/CD 🥴👹. Come check it out! info.defcon.org/event/?id=54867 @PaloAltoNtwks #OIDC #oauth2 #ci #cd

_0xffd's tweet image. This Saturday I will be speaking at #DefCon32 about OIDC misconfigurations and abuses in the context of CI/CD 🥴👹.

Come check it out!
info.defcon.org/event/?id=54867

@PaloAltoNtwks
#OIDC #oauth2 #ci #cd

Finally reached @fossasia #Fossasiasummit. I'm super excited for my talk tomorrow on #CIAM #OAuth2 #OIDC @OpenFGA . If you are in #Hanoi , I would love to meet you.

augvcor's tweet image. Finally reached @fossasia #Fossasiasummit. I'm super excited for my talk tomorrow on #CIAM #OAuth2 #OIDC @OpenFGA . If you are in #Hanoi , I would love to meet you.

OAuth 2.0 is the backbone of secure API access Here's the breakdown: - Grant types: Auth Code, Implicit, Client Credentials... - Core concepts: Tokens, Resource Owner, Auth Server - Security tips - OpenID Connect: for user identity A great visual by MasteringBackend. #OAuth2

master_backend's tweet image. OAuth 2.0 is the backbone of secure API access

Here's the breakdown:
- Grant types: Auth Code, Implicit, Client Credentials...
- Core concepts: Tokens, Resource Owner, Auth Server
- Security tips
- OpenID Connect: for user identity

A great visual by MasteringBackend.

#OAuth2

Loading...

Something went wrong.


Something went wrong.


United States Trends