Showing all 5 blog posts tagged with "authentication".
-
The Magic of Single Sign-On
I remember being really impressed the first time I encountered single sign-on (SSO), in which I could access multiple websites after just logging in once. But I was even more i... Read more
January 29, 2021 -
JWT Authentication: Rethinking the Pattern
Part two of a two-part series. View part one. Stateless authentication with JSON Web Tokens — safely! As developers who build REST APIs, we are quite familiar with JSON Web To... Read more
October 20, 2020 -
JWT Authentication: How Does it Work?
Part one of a two-part series. A REST API is a wonderful way to expose application data to a wide variety of clients. Anything that can speak HTTP can communicate with a REST A... Read more
August 21, 2020 -
Our Top Tip for Computer Security During the Holidays
Updated December 2020. This holiday season, there's more online activity than ever, from shopping to Zoom sessions with family and friends, not to mention remote work and school... Read more
November 29, 2018 -
Managing your AWS Container Infrastructure with Python
We deploy Python/Django apps to a wide variety of hosting providers at Caktus. Our django-project-template includes a Salt configuration to set up an Ubuntu virtual machine on ... Read more
June 28, 2017