|
You are here |
www.mathieupassenaud.fr | ||
| | | | |
www.rasikjain.com
|
|
| | | | | Here are three scenarios for implementing authentication workflows. Internet Applications (Public facing) For internet web applications and APIs, Session based (SessionID cookie) and Token Based (JWT) Authentication can be implemented. Session Based: Implemented for a majority of traditional and stateful web applications. Once the user is authenticated, A Session state is created and stored in an external State server or SQL database. The Session state is identified by a unique SessionID.... | |
| | | | |
appcodelabs.com
|
|
| | | | | This tutorial shows you how to build an MQTT message broker in minutes using a Raspberry Pi. Easily test it using another computer or virtual machine. | |
| | | | |
jurian.slui.mn
|
|
| | | | | MQTT is essential in a IoT setup, but the default is completely insecure. In three simple steps you level up your security. | |
| | | | |
www.thepolyglotdeveloper.com
|
|
| | | Learn how to continuously deploy a static generated site to a remote server on push and on a schedule with GitLab CI. | ||