Tag: authentication
				
										
									
					
							
						
				In this article I will share what I could not find (exactly) in the documentation and what my AI assistants wildly hallucinated about (too little documentation, too little code …			
					
								
												
									
					
							
						
				What is the easiest, cheapest and fastest way to make a static web application available to a group of end users? Probably a public GitHub repository and GitHub Pages. …			
					
								
												
									
					
							
						
				As of Oracle database release update 19.18 a new authentication method was made available utilizing Azure AD (Entry ID as its named by Microsoft recently) Oauth tokens. Using this …			
					
								
												
									
					
							
						
				I have worked quite a bit in Oracle Cloud, starting back in 2015. I have used many different OCI services – such as Integration, Streaming, Functions, OKE, API Gateway, …			
					
								
												
									
					
							
						
				In a recent article, I described the use of the OCI SDK for Go(Lang) – in my example to interact with the ObjectStorage service. In the article, I used …			
					
								
												
									
					
							
						
				OAuth2 is a popular authentication framework. As a service provider it is thus common to provide support for OAuth2. How can you do this on a plain WebLogic Server …			
					
								
												
									
					
							
						
				The situation discussed in this article is as follows: a rich client web application (JavaScript based, could be created with Oracle JET or based on Angular/Vue/React/Ember/…) is embedded in …			
					
								
												
									
					
							
						
				As part of the Soaring through the Clouds demo of 17 Oracle Public Cloud services, I had to integrate SOA CS with both ACCS (Application Container Cloud) and ICS …			
					
								
												
									
					
							
						
				News flash: According to a post on LinkedIn by Oracle’s Chief Identity Architect Vadim Lander, the IDCS is live, as of November 1st. An important missing link until now …			
					
								
												
									
					
							
						
				Of course we take all reasonable measures to ensure only people we know gain access to our systems and our data (confidentiality through authentication) and that they do so …			
					
								
												
									
					
							
						
				Clearly, identity and access management is crucial. For on premises enterprise applications, with mobile apps and no less with cloud based applications. Identity and Access Management revolves around a …			
					
								
												
									
					
							
						
				About 2 months ago I wrote an article about setting up user authentication in Cloud control, based on their account in the Active Directory. As promised, here is the …			
					
								
												
									
					
							
						
				If your company is preferring Microsoft Active Directory as a source of truth (or at least you´re trying to) you should be using the AD as source for the …