Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important…
Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0…
User Managed Access is an OAuth-based access management protocol that allows owners of resources to passively authorize access to their…
OpenID Connect is an authentication protocol built on top of OAuth 2.0 to facilitate identity provision and Single Sign-On. …Read…
A primer on OAuth 2.0 for dummies by a dummy.…Read More
This tutorial explains in detail how Redux can be integrated into your Flutter app to help manage the state of…
There may be situations where you may have to take pictures remotely and view them. With a Raspberry Pi single-board…
Needless to say, WordPress’ Gutenberg editor has made life easy for a lot of people. You no more need additional…
Docker helps keep your development and production environment constant allowing swift migration of apps from development to production. Since I…
Regularly backing up your web server content, or any content for that matter, is essential to avoid data loss in…
An SSD comes with a lot of advantages. It’s quick and fast and makes your PC boot faster, which, you…
Setting up your Raspberry Pi device with Rasbian can be easy if you have the luxury of an HDMI monitor.…
Let me begin this article apologizing to all cricket devotees who would consider questioning Bradman’s forte a blasphemy. But I…
Afghanistan are early favourites to make it into the 2016 Asia Cup, but can there be upsets?The Asia Cup tournament for…
Cricket is a quirky sport in a way that it requires more input from the cerebrum in comparison to any…
Bye Bye Test cricket! In a shocking revelation Test cricket, one of the three formats in cricket has announced that…