Skip to the content Skip to the Navigation

Wilddiary.com

  • Home
  • Contact Us
  • Privacy

Security

  1. HOME
  2. Security
authentication
November 8, 2023 / Last updated : November 8, 2023 Drona Security

OAuth2 Authentication in Keycloak for Public Clients

Unlock the power of secure authentication in your web applications with our developer’s guide to Authentication using the Authorization Code Grant Type and PKCE in Keycloak. Discover the step-by-step process for initiating this robust authentication flow, including client registration, parameter generation, and code exchange. Learn how to create the essential code verifier and code challenge, safeguarding your users and their data. Elevate your web application’s security and enhance the user experience with Keycloak’s state-of-the-art authentication methods.

security
April 3, 2023 / Last updated : April 3, 2023 Drona Security

Exploring XDR Architecture: Collectors, Platform, and Response Orchestration

With the increasing number of cyber threats, organizations have been forced to adopt new strategies to combat them. One such strategy is XDR or Extended Detection and Response. XDR is a comprehensive security solution that detects and responds to threats across all endpoints, networks, and cloud environments. In this article, we will describe the architecture […]

  • Home
  • Contact Us
  • Privacy
  • Facebook
  • Twitter
  • RSS Feed
  • GitHub
  • Pinterest

Copyright © Wilddiary.com All Rights Reserved.

Powered by WordPress & Lightning Theme by Vektor,Inc. technology.

MENU
  • Home
  • Contact Us
  • Privacy