Should you be worried about OAuth client impersonation? Let's answer some of the most frequently misunderstood questions about | Continue reading
Understanding platform-level constraints is a prerequisite for developing great mobile experiences. This article explores browser options available on iOS, how they've evolved, and their cookie-sharing behaviors. | Continue reading
Let's look at the state of Foreign Function Interface (FFI) in Java. | Continue reading
A glimpse into the near future of programming | Continue reading
An in-depth look at the successor to JSON Web Tokens: PASETO. | Continue reading
This tutorial shows you how to use React Hooks to build a simple, secure app. | Continue reading
Learn how to build command line applications using Node.js | Continue reading
The cloud is maturing from virtual machines being a discrete unit of work to virtual functions. In this post, we explore serverless with Java and AWS | Continue reading
Are you securing your microservice architectures by hiding them behind a firewall? That works, but there are better ways to do it. | Continue reading
The best testing tools available for Node.js | Continue reading
Multi-factor authentication is slow, annoying, and frustrating. Let's talk about ways we can fix it. | Continue reading
An illustrated guide to explain OAuth and OpenID Connect! | Continue reading
A short guide which explains how to properly secure containers and things to keep in mind when using containers. | Continue reading
This post discusses software development as a creative and not purely technical pursuit. | Continue reading
GitHub has announced GitHub Package Registry. Does this spell the death for npm? | Continue reading
CI/CD automation, code analysis, and database versioning. Check out the top 5 tools for DevOps automation that every .NET developer should know. | Continue reading
This post discusses the disadvantages of using the 'I' prefix for interfaces in static-typed languages. | Continue reading
Sign In with Apple is based on OAuth 2.0 and OpenID Connect, and provides a privacy-friendly way for users to sign in to websites and apps | Continue reading
Our recommendations for the essential Visual Studio Code extensions for Node.js developers. | Continue reading
In this post, we'll look at what's changing in the Implicit Flow and why. | Continue reading
This tutorial walks you through building a simple Azure Function in C#. | Continue reading
Are you in developer advocacy or a frequent conference speaker? Read this post for tips and tricks for making your life a lot easier. | Continue reading
Developers don't care about OAuth or OpenID Connect. Learn why. | Continue reading
Let's take a look at two ways it's possible to hack secret API keys out of mobile apps. | Continue reading
Here are the new features coming to ES2019 for JavaScript. | Continue reading
This post explores the history of how asynchronous calls are made in JavaScript, and how to make them in the future. | Continue reading
There's never been a better time to be a programmer, and JavaScript is a strategically important language to learn. Make it your goal to learn more in 2019! | Continue reading
Native and Mobile apps have special requirements for using OAuth 2.0. | Continue reading
OAuth 2.0 is a standard that apps can use to provide client applications with secure delegated access. OAuth works over HTTPS and authorizes devices, APIs, servers, and applications with access tokens rather than credentials. OIDC adds a signed ID token and a UserInfo endpoint. | Continue reading
This tutorial walks you through adding simple authentication and authorization to your ASP.NET Core application using Okta. | Continue reading
This article explores the benefits of token authentication with JWTs for Java apps. | Continue reading
Learn how to build a desktop application using Electron and React, then add authentication with OIDC. | Continue reading
Interested in ways to improve two-factor authentication for your users? We'll teach you how to grow two-factor adoption and build a more secure userbase. | Continue reading
Learn about the time-based one-time password algorithm using a credit-card-sized, Arduino-based game device and Okta Verify for MFA. | Continue reading
Learn why you should never use JSON web tokens as session tokens (either in cookies or HTML local storage). | Continue reading
This tutorial walks you through securing your ASP.NET Web Forms application with OpenID Connect and Okta | Continue reading