I wonder if I should use the CAS protocol or OAuth + some authentication provider for single sign-on. Example Scenario: A User tries to access a protected resource, but...
I’ve been experimenting with Docker recently on building some services to play around with and one thing that keeps nagging me has been putting passwords in a Dockerfile. I’m...
What is the difference between a cer, pvk, and pfx file? Also, which files do I keep and which am I expected to give to my counter-parties? 4 Answers...
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question...
I’m building a mobile app and am using JWT for authentication. It seems like the best way to do this is to pair the JWT access token with a...
Will content requested over https still be cached by web browsers or do they consider this insecure behaviour? If this is the case is there anyway to tell them...
I know cookie-based authentication. SSL and HttpOnly flags can be applied to protect cookie-based authentication from MITM and XSS. However, more special measures will be needed to apply in...
Payment Processors – What do I need to know if I want to accept credit cards on my website? [closed]
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question...
In order to mitigate against kernel or cross-process memory disclosure (the Spectre attack), the Linux kernel1 will be compiled with a new option, -mindirect-branch=thunk-extern introduced to gcc to perform...
How do I create a self-signed certificate for code signing using tools from the Windows SDK? 7 Answers 7

