Penetration testing of your service hosted in Azure
Imagene you have completed your application (service) and want to host it in Azure Cloud. Finally you decide to execute penetration testing. This is a good ...
Imagene you have completed your application (service) and want to host it in Azure Cloud. Finally you decide to execute penetration testing. This is a good ...
In my software carrier, I have been dealing with many types of credentials. Starting with Windows NT SSPI, NTLM, Kerberos, .NET Principals and finally today with ...
Traditionally enterprise applications in complex environments make usage of Enterprise Service Bus.The bus integration pattern provided bu an ESB has typically focused Service Oriented Architecture. ...
Typical .NET Core application uses the commaon configuration system defined in the package Microsoft.Extensions.Configuration. My intension in this post is not to describe how ...
When working with Identity Server, more sophisticated applications usually require specific context in the process of generating of the token. For example, imagine the user wants ...