How does HOTP authentication work?

5 years ago

Before smartphones were popular, hardware tokens that produced an HOTP code were a popular way of performing two-factor authentications. Businesses…

What is HMAC and how does it work?

5 years ago

HMAC stands for Hash-based Message Authentication Code or Keyed-hash Message Authentication Code. We use it to verify the authenticity and…

Jest for a Typescript-based React app

5 years ago

I recently had to install and configure Jest in a React app written using Typescript and ran into quite a…

Fix React Issues in Lerna using Yarn Workspaces

5 years ago

Lerna comes to our rescue when we are to manage multiple inter-dependent packages within a repository. Have a package that…

How does CIAM differ from IAM?

5 years ago

Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important…

The Authorization Code Redirect URI Manipulation attack in OAuth 2.0

5 years ago

Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0…

Getting started with User Managed Access (UMA)

5 years ago

User Managed Access is an OAuth-based access management protocol that allows owners of resources to passively authorize access to their…

Understanding OpenID Connect (OIDC)

5 years ago

OpenID Connect is an authentication protocol built on top of OAuth 2.0 to facilitate identity provision and Single Sign-On. …Read…

What is OAuth 2.0? How does it work?

5 years ago

A primer on OAuth 2.0 for dummies by a dummy.…Read More

Managing state in Flutter using Redux

5 years ago

This tutorial explains in detail how Redux can be integrated into your Flutter app to help manage the state of…