PinnedHow to create an effective test automation strategyThis article outlines some test automation best practices and answers the following questions:Oct 1, 20186Oct 1, 20186
PinnedPublished inVX CompanySecure .NET microservices with Azure Container Apps and DAPRThe concept of microservices sounds fairly easy. And it is. Until you start adding requirements. For example, here are some common…Nov 1, 20221Nov 1, 20221
Set up a SPA+BFF with ASP.NET Core and Angular in 3 steps (.NET 8)Last year I wrote an article about how to set up a SPA + BFF with .NET 7. In short, to scaffold an ASP.NET Angular project in .NET 7 and…Jan 24Jan 24
Three examples of SSO gone wrongSingle Sign-On (SSO) allows a user to authenticate once and sign in to various applications. SSO is great; it makes the web more secure by…Dec 12, 20232Dec 12, 20232
Published inThe Web Application Security HubUnderstanding OAuth2Explaining the concepts, use-cases, and possibilities of the OAuth2 protocolAug 2, 20232Aug 2, 20232
Published inThe Web Application Security HubThe Back-end For Front-end Security PatternIn today’s digital landscape, delivering exceptional user experiences while ensuring robust security measures is paramount for the success…Aug 2, 20232Aug 2, 20232
Published inThe Web Application Security HubDistributed appsA distributed app is an app that runs on several machines in a network. A distributed app processes workload by delegating parts of the…Aug 2, 2023Aug 2, 2023
Published inThe Web Application Security HubWhat is a reverse proxy?Reverse proxies are used to route traffic to servers in a network. Or, from a Kubernetes perspective: A reverse proxy is used to route…Aug 2, 2023Aug 2, 2023
Published inThe Web Application Security HubWhat is Authorization Code with Proof Key for Code Exchange?The Authorization Code flow with Proof Key for Code Exchange (PKCE) is an authentication method. It’s part of OAuth2. It is used to…Aug 2, 2023Aug 2, 2023
Published inThe Web Application Security HubImplementing API Authorization with ASP.NET Core and OAuth2OAuth2 and OpenID Connect (OIDC) protocols are robust and reliable solutions for establishing secure access control and verifying…Aug 2, 2023Aug 2, 2023