Sharing my initial experience with verifiable credentials.
Tag Archives: authentication
Cross-tenant workload identities with a single secret
You can have cross-tenant workload identities authenticating using the secret or certificate from their home tenant.
Building secure applications using modern authentication (part 4)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 3)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 2)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Building secure applications using modern authentication (part 1)
You don’t need to disable MFA for users in the name of “automation”. Basic authentication is considered legacy authentication because there are safer options available. Keep reading to learn about OAuth, OIDC, modern authentication and how to use the valet key to create secure applications.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 3)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 3*.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 2)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 2*.
Passwordless Azure VM SSH login using FIDO2 security keys (Part 1)
Passwordless ssh to Azure VMs using FIDO2 security keys. *Part 1*.