Link Details

Link 1040225 thumbnail
User 1104931 avatar

By bjensenSP
via stormpath.com
Published: Sep 27 2013 / 13:24

How do you let an application know which user to “run as” securely? And how do you verify that the user running the application as someone else is who she says she is? Those very questions came in to our support team, and we have a best practice approach you can apply in your own application architecture that we’d love to share.
  • 12
  • 0
  • 890
  • 843

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Apache Hadoop
Written by: Piotr Krewski
Featured Refcardz: Top Refcardz:
  1. Play
  2. Akka
  3. Design Patterns
  4. OO JS
  5. Cont. Delivery
  1. Play
  2. Java Performance
  3. Akka
  4. REST
  5. Java