InfoQ Homepage Identity Management Content on InfoQ
-
OAuth - Everything You Want to Know (Hopefully)
Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.
-
Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security
Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
-
Securing the Cloud: Identity Management and Network Security in the Cloud
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.
-
Accessing Real-World APIs from Clojure
Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.
-
Who are You? Who am I? Who is Anybody?
Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.
-
Spring Social: For the New Web of APIs
Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.
-
Identity Management with Spring Security
David Syer discusses identity management, SSO, security standards –SAML, OpenID, OAuth, SCIM, JWT-, how Spring Security can fit in, and demoing IdM as a service.
-
The Rise of OAuth
Craig Walls talks about securing the modern web and how OAuth can help with that, showing how to secure and consume resources with OAuth.
-
Getting Started With Spring Security 3.1
Rob Winch demoes some of the new features in Spring Security 3.1: multiple http elements, stateless authentication mode for RESTful services, Debug Filter, CAS support for proxy tickets, JAAS, etc.
-
SpringOne 2GX Keynote: Next Generation Applications
Ben Alex along with a SpringSource team present the future of mobile applications, authorization, data, and application architecture as seen by VMware.
-
Enterprise SOA Security
Dirk Krafzig presents general aspects of implementing SOA security using a token and role-based approach rather than session and application-based access to resources, including organizational issues.
-
Introduction to Spring Security 3/3.1
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.