InfoQ Homepage Authentication Content on InfoQ
-
GitLab 8.9 Adds File Locking, Hardware U2F Support
The release of GitLab 8.9 brings a file locking, a refreshed UI, and hardware-based two-factor authentication. Teaming up with Yubico, developers can now use a hardware YubiKey to automatically authenticate a GitLab session without having to type in a 6-digit TOTP code. In addition, file locking will keep binary assets from getting destroyed during a merge.
-
Keeping Your Secrets Safe in a Distributed and Scalable Environment
At the Velocity Conference in Amsterdam, Alex Shoof explained how to manage secrets in a scalable and distributed environment. Shoof proposed a system based on five fundamental principles for secret management.
-
Facebook's and Twitter's SDKs for Apple tvOS Enable Onboarding and Analytics
Facebook and Twitter have released SDKs for Apple tvOS to provide support for onboarding, user verification, and analytics.
-
Nexmo Verify SDK Touts Easy Phone Number-based Authentication
Nexmo has announced the availability of its Verify SDK for iOS, Android, and JavaScript, which makes it possible to securely register and authenticate users based on their mobile phone numbers, Nexmo says.
-
Google Introduces Smart Lock for Passwords
Google has announced at I/O 2015 the Google Identity Platform, a collection of tools and APIs for managing identities and dealing with authentication and authorization across Android, iOS and web applications.
-
Major Update to Firebase Brings Rich Authentication Tokens
Firebase has this week announced major updates to its user authentication, including automatic session persistence, and rich authentication tokens for use in Security Rules.
-
Visual Studio 2013 Adds New Project Templates with Improvements and Social Accounts Authentication
The recently released Visual Studio 2013 includes new project templates with several improvements which enables developers to build projects and applications faster.
-
Outsource User Management and Authentication with Stormpath
Most applications these days require user management, authentication, and authorization from the beginning and even a minor mistake can be disastrous. To help developers focus more on what the application actually does, Stormpath is offering turnkey user management and authentication services. Using these services, applications can authenticate users via a single API call.
-
Multi-Factor Authentication For Windows Azure Hosted Apps
Microsoft recently announced preview of Multi-Factor Authentication in Windows Azure. This can be enabled for Windows Azure Management portal, Microsoft Online Services such as Office 365, as well as custom applications.
-
The Gospel of MBaaS- According to Anypresence Co-Founder (Part 2 of 2)
Part 2 of Infoq’s exclusive virtual interview with Anypresence cofounder Richard Mendis. The CMO weighs in on Facebook’s acquisition of competitor Parse and provides intel on the pricing structure of Anypresence.
-
Google+ Sign-In: Federated Identity, Authorization and Semantic Activity Streams
Google+ Sign-In extends the Google+ social network into third-party websites, desktop applications and mobile apps. This service, announced on February 26th, provides features for authentication, authorization and activity sharing. There is also support for user engagement, hangouts and automatic Android app downloads.
-
Powering Your Apps with Microsoft Accounts
A central theme with Windows 8 is the Microsoft Account. This is another attempt to offer a single sign-on system for both Microsoft and third-party services. Microsoft Account is available for Windows 8 apps, normal websites, Windows Phone, Android, and iOS.
-
Java EE 6: Application Security Enhancements
Java Enterprise Edition Version 6 release includes new security features in the areas of web container security as well as authentication and authorization aspects of Java application development. These features include programmatic and declarative security enforcement in the web tier. This post gives an overview of these new security features.
-
RESTful API Authentication Schemes
“Everyone feels the need to write a custom authentication protocol” says George Reese, which he claims is one of the things he learnt working on a programming API for cloud providers and Saas Vendors. In a post George proposes a set of standards for any REST authentication need.