mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#oauth2

0 Beiträge0 Beteiligte0 Beiträge heute
credativ GmbH<p>Mit PostgreSQL 18 wurde eine spannende neue Funktion eingeführt: Native Unterstützung für OAuth2. Wie funktioniert das jetzt nun?</p><p>Mehr Informationen findet ihr unter:<br><a href="https://www.credativ.de/blog/credativ-inside/postgresql-18-trifft-oauth2-so-funktioniert-die-native-unterstuetzung-mit-keycloak/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">credativ.de/blog/credativ-insi</span><span class="invisible">de/postgresql-18-trifft-oauth2-so-funktioniert-die-native-unterstuetzung-mit-keycloak/</span></a></p><p><a href="https://mastodon.social/tags/credativ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>credativ</span></a> <a href="https://mastodon.social/tags/postgresql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postgresql</span></a> <a href="https://mastodon.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keycloak</span></a> <a href="https://mastodon.social/tags/oauth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth2</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
|7eter l-|. l3oling 🧰<p>I need to feed my family, so please consider supporting my open source work. The various OAuth libraries are often buried deep inside dependency trees, so aren't top of mind, but they are a great deal of work to maintain. <a href="https://ruby.social/tags/Ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ruby</span></a> <a href="https://ruby.social/tags/FLOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FLOSS</span></a> <a href="https://ruby.social/tags/oauth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth2</span></a> <a href="https://ruby.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> :ruby: 🔒 <a href="https://opencollective.com/ruby-oauth/updates/oauth2-recent-releases" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opencollective.com/ruby-oauth/</span><span class="invisible">updates/oauth2-recent-releases</span></a></p>
Sven-Torben Janus<p>🎤 I’m speaking at <a href="https://mas.to/tags/KeyConf25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KeyConf25</span></a> this August in Amsterdam!</p><p>My talk will dive into Token Exchange in real-world Keycloak setups — advanced patterns, pitfalls, and practical tips.</p><p>🎟️ Grab your ticket: <a href="https://keyconf.dev" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">keyconf.dev</span><span class="invisible"></span></a><br><a href="https://mas.to/tags/Keycloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keycloak</span></a> <a href="https://mas.to/tags/OAuth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth2</span></a> <a href="https://mas.to/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> <a href="https://mas.to/tags/IAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IAM</span></a> <a href="https://mas.to/tags/SSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSO</span></a> <a href="https://mas.to/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p>
Emily<p>Moved away from EMQX for my home lab as they moved to a new licensing scheme and dropped features on the community version to <a href="https://hackaday.social/tags/RabbitMQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RabbitMQ</span></a> 4.1.1. </p><p>After a day of working on it, got <a href="https://hackaday.social/tags/oauth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth2</span></a> into the cluster working, and <a href="https://hackaday.social/tags/ldap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ldap</span></a> backed <a href="https://hackaday.social/tags/mqtt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mqtt</span></a> client logins. </p><p>Not as flashy as EMQX, but fitting my needs so far very well.</p><p>Really wanted unified account management and doing it all through <a href="https://hackaday.social/tags/Authentik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentik</span></a> through oauth2 and it's LDAP outpost is very cool. No more local mqtt accounts 😊 </p><p><a href="https://hackaday.social/tags/Homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Homelab</span></a> <a href="https://hackaday.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>
OpenHistoricalMap<p>Do you already contribute to <span class="h-card" translate="no"><a href="https://en.osm.town/@openstreetmap" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>openstreetmap</span></a></span>? You can start contributing to OpenHistoricalMap too in just a few clicks, without having to juggle yet another password for yet another mapping site. Once you have a taste of OSM <a href="https://mapstodon.space/tags/SingleSignOn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SingleSignOn</span></a> via <a href="https://mapstodon.space/tags/OAuth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth2</span></a>, you’ll never look back.</p>
Sven Jacobs :androidHead:<p>Today I released the first version of <a href="https://androiddev.social/tags/Lokksmith" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lokksmith</span></a>, a <a href="https://androiddev.social/tags/KotlinMultiplatform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KotlinMultiplatform</span></a> OpenID Connect client library for <a href="https://androiddev.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> and <a href="https://androiddev.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a>. I've been working on this in my spare time for the past few weeks. I finally reached a state that I can proudly show to the world.</p><p>The first release contains a fully working implementation for Android. The iOS integration is not yet available. Any help regarding iOS is greatly appreciated. </p><p><a href="https://lokksmith.dev" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lokksmith.dev</span><span class="invisible"></span></a></p><p><a href="https://androiddev.social/tags/Kotlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kotlin</span></a> <a href="https://androiddev.social/tags/OpenID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenID</span></a> <a href="https://androiddev.social/tags/OpenIDConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenIDConnect</span></a> <a href="https://androiddev.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> <a href="https://androiddev.social/tags/OAuth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth</span></a> <a href="https://androiddev.social/tags/OAuth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth2</span></a></p>
|7eter l-|. l3oling 🧰<p>:ruby: Let's support kids.</p><p>By "kids", I of course mean support for Key IDs (kids) in JWT assertions (IETF rfc7515 JSON Web Signature - JWS compliant)</p><p>Of course, I also mean <a href="https://ruby.social/tags/FreePalestine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreePalestine</span></a>, and <a href="https://ruby.social/tags/SayNoToGenocide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SayNoToGenocide</span></a></p><p>For a full writeup:</p><p><a href="https://dev.to/galtzo/ann-oauth2-v2012-w-support-for-kids-57be" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dev.to/galtzo/ann-oauth2-v2012</span><span class="invisible">-w-support-for-kids-57be</span></a></p><p><a href="https://ruby.social/tags/Ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ruby</span></a> <a href="https://ruby.social/tags/JWT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JWT</span></a> <a href="https://ruby.social/tags/Oauth2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oauth2</span></a></p>

Hey, folks! I’m looking for a Staff Software Engineer to join my team (API Core) at #Mailchimp.

Some of the things we work on: #PHP, #REST, #OpenAPI, #OAuth2, #APIGovernance, and more.

We are stewards of our public #APIs, and we collaborate with other capabilities teams to ensure APIs are developed according to our standards and processes. You would work directly with me on a daily basis.

This position is in Atlanta or New York.

jobs.intuit.com/job/atlanta/st

Software Engineering Careers at IntuitStaff Software Engineer (API Core Team)Learn more about applying for Staff Software Engineer (API Core Team) at Intuit

A tale from the shithole of #Microsoft #Outlook. 1/2

For reasons outside my control I had to setup an #IMAP account with #Microsoft #Exchange Online with #2FA #OAuth2. After some ado, it worked on 2 Linux computers with Mozilla #Thunderbird.

#Privacy is bad because you have to enable cookies for all parts of the Thunderbird profile, but it works.

On the 3rd computer, the 2FA failed. Error 50058, a Microsoft-window with the email address flashing along but no way to enter anything. 1/2