|
You are here |
aaronparecki.com | ||
| | | | |
blog.christianposta.com
|
|
| | | | | The Model Context Protocol has created quite the buzz in the AI ecosystem at the moment, but as enterprise organizations look to adopt it, they are confronted with a hard truth: it lacks important security functionality. Up until now, as people experiment with Agentic AI and tool support, they've mostly adopted the MCP stdio transport, which means you end up with a 1:1 deployment of MCP server and MCP client. What organizations need is a way to deploy MCP servers remotely and leverage authorization to give resource owner's access to their data safely. | |
| | | | |
marcolabarile.me
|
|
| | | | | A brief introduction to OAuth 2.0 and OpenID Connect that allows you to quickly choose the best flow for your application. | |
| | | | |
www.styra.com
|
|
| | | | | Using OAuth2 and OpenID Connect in Open Policy Agent to secure applications and verify the identity of callers. | |
| | | | |
blog.intothesymmetry.com
|
|
| | | tl;dr if you are using go-jose , node-jose , jose2go , Nimbus JOSE+JWT or jose4j with ECDH-ES please update to the latest version. RFC 7... | ||