OpenPGP Signing of HTTP POSTmailing list post on the IETF's openPGP list about using pgp with HTTP#pgp#http#gpg#encryption#authentication·imc.org·May 8, 2007OpenPGP Signing of HTTP POST
mozdev.org - enigform: indexfirefox extension for using gpg to sign POST requests#authentication#firefox#pgp#security#gpg#plugins·enigform.mozdev.org·May 8, 2007mozdev.org - enigform: index
reCAPTCHA: Stop Spam, Read Booksstop spam. read books.#authentication#antispam#captcha#api·recaptcha.net·Jun 1, 2007reCAPTCHA: Stop Spam, Read Books
Dr Nic » Zero Sign On - 1 better or Infinitely better than Single Sign On?OpenID + Client Certificates#openid#authentication·drnicwilliams.com·Feb 21, 2008Dr Nic » Zero Sign On - 1 better or Infinitely better than Single Sign On?
HOWTO: Securing A Website With Client SSL Certificates#ssl#authentication·blogs.ittoolbox.com·Feb 22, 2008HOWTO: Securing A Website With Client SSL Certificates
#1288 (SSL Client Certificate validation.) - lighttpd - secure, fast, compliant, and very flexible web-server - Tracpatch that adds ssl client certificate support to lighttpd#lighttpd#ssl#authentication·trac.lighttpd.net·Feb 22, 2008#1288 (SSL Client Certificate validation.) - lighttpd - secure, fast, compliant, and very flexible web-server - Trac
Common threads: OpenSSH key management, Part 1using key based auth with ssh#authentication#ssh#networking#howto·ibm.com·Mar 11, 2008Common threads: OpenSSH key management, Part 1
Consuming OAuth intelligently in Rails#oauth#rails#ruby#authentication#programming·stakeventures.com·Jul 23, 2009Consuming OAuth intelligently in Rails
The Rails Way: Users and Passwords#rails#security#authentication#ruby#programming·therailsway.com·Sep 20, 2009The Rails Way: Users and Passwords
Facebook Wants to Supply Your Internet Driver's License - Technology Review#facebook#internet#authentication#web·technologyreview.com·Jan 6, 2011Facebook Wants to Supply Your Internet Driver's License - Technology Review
Open ID Is A Nightmare#authentication#oauth#openid·blog.wekeroad.com·Jan 26, 2011Open ID Is A Nightmare
Why you should never use hash functions for message authentication | The If Works#security#crypto#authentication#programming·blog.jcoglan.com·Jun 10, 2012Why you should never use hash functions for message authentication | The If Works
Authentication with Warden, devise-less#authentication#ruby#rails·pothibo.com·Sep 18, 2015Authentication with Warden, devise-less
Passwords are Obsolete — Medium#passwords#authentication·medium.com·Jun 11, 2016Passwords are Obsolete — Medium
Authenticating to HashiCorp Vault using Google Cloud IAM | Google Open Source BlogInteresting example (in golang) of authenticating to vault using a JWT signed by a GCP service account#authentication#vault#gcp·opensource.googleblog.com·Oct 24, 2018Authenticating to HashiCorp Vault using Google Cloud IAM | Google Open Source Blog
Simplifying identity and access management of your employees, partners, and customers | Google Cloud Blog#gcp#authentication#sso·cloud.google.com·May 2, 2019Simplifying identity and access management of your employees, partners, and customers | Google Cloud Blog
How SAML 2.0 Authentication Works#saml#authentication·gravitational.com·Jul 29, 2019How SAML 2.0 Authentication Works
AWS federation comes to GitHub Actions | Aidan Steele’s blog (usually about AWS)#aws#github#authentication#oidc·awsteele.com·Sep 19, 2021AWS federation comes to GitHub Actions | Aidan Steele’s blog (usually about AWS)
The SSO Wall of Shame | A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.#enterprise#sso#authentication·sso.tax·Jul 5, 2022The SSO Wall of Shame | A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.