Link Details

Link 997157 thumbnail
User 355617 avatar

By piccoloprincipe
via infoq.com
Submitted: Jul 13 2013 / 04:42

Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.
  • 1
  • 0
  • 154
  • 16

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Upvoters (1)



Downvoters (0)



    Apache Hadoop
    Written by: Piotr Krewski
    Featured Refcardz: Top Refcardz:
    1. Play
    2. Akka
    3. Design Patterns
    4. OO JS
    5. Cont. Delivery
    1. Play
    2. Java Performance
    3. Akka
    4. REST
    5. Java