Tags » OAuth

Exchange 2013 Hybrid Configuration Wizard (Part II)

In my previous blog post I explained about an Exchange 2013 hybrid configuration, and what the prerequisites are for such a configuration and how to implement and configure one (or more) Exchange 2013 Hybrid servers. 1,223 more words


Give your WCF Security Architecture a Makeover with IdentityServer3

Not everybody has the luxury of being able to start over and build the new & modern version of their software from scratch. Many people I speak to have existing investments in WCF and their “old-school” desktop/intranet architecture. 776 more words


Asp.Net MVC Enable OAuth for Linkedin

OAuth for Linkedin is not installed by default.

You have to NuGet a package called “Owin.Security.Providers”. It does LinkedIn Yahoo, etc.

Make sure you add the following to your Startup.Auth.cs… 85 more words


Conctarse a Twitter con R desde cero.

A través del R-Help, leí un correo con varias dudas sobre la conexión con R a Twitter. En concreto con el paquete “twitteR”. De modo que me animé a escribir un post para describir los pasos necesarios desde cero, ya que mucha gente oye hablar de R de su potencia pero bien por su formación o por el miedo a las personas no acostumbradas a escribir código se les hace cuesta arriba, más que nada que gracias a R podemos obtener mucha información de manera muy sencilla, para su posterior análisis. 373 more words


GitHub API change causes problems to Jenkins and Gerrit

GitHub has recently changed his API default permissions and has caused big problems and outages to Jenkins or Gerrit instance configured for with OAuth 2.0 authentication. 611 more words

Three days of Identity & Access Control Workshop at SDD Deep Dive - November 2015, London

As part of the SDD Deep Dive event in London – Brock and I will deliver an updated version of our “Identity & Access Control for modern Web Applications and APIs” workshop. 75 more words


Spring Oauth2 with Authorization Code

In this article I’ll show how to develop a solution that uses OAuth2 as authentication protocol with Authorization code during the flow process.

Spring Framework has been used as backbone of the solution and the user’s token generated have been persisted in a MySQL Database. 3,381 more words