Hacker News
- How hard is it to add in access_token validation protocol that provides them? http://hueniverse.com/2012/07/26/oauth-2-0-and-the-road-to-hell/ 2 comments
- TIL The creator of OAuth hates OAuth 2.0 and is no longer associated with it. http://hueniverse.com/2012/07/26/oauth-2-0-and-the-road-to-hell/ 15 comments programming
Linking pages
- Teller - The API for your bank account https://blog.teller.io/2016/04/26/tauth.html 191 comments
- Modern backend (BaaS) frameworks - an overview of Usergrid, LoopBack, Para, BaasBox, Deployd and Telepat | Erudika Blog http://www.erudika.com/blog/2015/10/21/backend-frameworks-usergrid-loopback-para-baasbox-deployd-telepat/ 1 comment
- Beware of NoSQL standards in Oracle's clothing | InfoWorld http://www.javaworld.com/article/2142327/data-storage/beware-of-nosql-standards-in-oracles-clothing.html#tk.rss_all 0 comments
- Why I'm Meh About JSON API - Jeremy W. Sherman https://jeremywsherman.com/blog/2016/07/23/why-im-meh-about-json-api/ 0 comments
- NoAuth. A pragmatic security framework | by Sean Nicholls | Medium https://medium.com/@seannicholls/noauth-4d5a9a106273 0 comments
- Writing a WS-Federation based STS using WIF | Aashish Koirala's Software and Tech Blog https://aashishkoirala.wordpress.com/2015/02/10/writing-a-ws-federation-based-sts-using-wif/ 0 comments
Related searches:
Search whole site: site:hueniverse.com
Search title: How hard is it to add in access_token validation protocol that provides them?
See how to search.