useTransition and useDeferredValue are two new hooks React introduced with React 18 earlier this year. These two hooks make use…
Courtesy: Yagi Studio/Getty Images In the previous article, we looked at the motivation behind blockchain. In this article, let’s look…
Courtesy: https://www.goodbadmarketing.com/ The online literature on blockchain is torn between too simplistic rundowns for non-techies and advanced hieroglyphic riddles targeted…
Browser redirection is an integral part of the Open ID Connect (OIDC) authentication flow. At the same time, it is…
Single-Page Applications (SPAs) are fast becoming ubiquitous as they provide a far better user experience over the traditional multi-page applications.…
Unless you have been living under a rock, you would be very used to authenticating yourself using an authenticator app…
Before smartphones were popular, hardware tokens that produced an HOTP code were a popular way of performing two-factor authentications. Businesses…
HMAC stands for Hash-based Message Authentication Code or Keyed-hash Message Authentication Code. We use it to verify the authenticity and…
Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important…
Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0…