Total 21 Posts

Security

Keycloak High Availability in Cloud environment (AWS) - PART 4/4

All the configuration presented in the previous parts have been settled according to our simulation…

Read More


Jul 29, 2020 9 min read

Sébastien Mazade

Feedback

Keycloak High Availability in Cloud environment (AWS) - PART 3/4

In previous part, we have explained our context and how to configure our infrastructure and…

Read More


Jul 08, 2020 9 min read

Sébastien Mazade

Feedback

Securing your APIs using Okta and a JHipster gateway

A step by step guide on setting up a JHipster application with Okta that provides first class support for system users.…

Read More


Jun 18, 2020 10 min read

Ben Scott

JHipster

Keycloak High Availability in Cloud environment (AWS) - PART 2/4

In the previous first part, we have described the main cloud architecture, according to the…

Read More


Jun 08, 2020 12 min read

Sébastien Mazade

Feedback

Keycloak High Availability in Cloud environment (AWS) - PART 1/4

For those who do not already know the Keycloak product, it is the main IAM…

Read More


May 20, 2020 9 min read

Sébastien Mazade

Feedback

Integrating Civic into a Static Serverless Website (part 2 of 2)

This is the second part of this tutorial (first part here). By now your static…

Read More


Mar 28, 2019 11 min read

Tyler John Haden

AWS

Integrating Civic into a Static Serverless Website Part 1 of 2

This article describes an application that takes advantage of AWS serverless services to provide a…

Read More


Mar 25, 2019 10 min read

Tyler John Haden

AWS

Service Oriented Network Security - AWS Security Group Design

Amazon Web Services is capable of providing the infrastructure to run all of your applications…

Read More


Aug 23, 2016 9 min read

Josh Shipp

AWS

JHipster: Streamlining the Hackathon Experience

For most 24 hour Hackathons, the work starts a week or two prior to the…

Read More


Jan 13, 2016 3 min read

Ahmed MSOUBER

Angular

Security White Paper: OWASP - Building Secure Web Applications

Nowadays, software application security absolutely cannot be ignored and every IT professional must take this…

Read More


Jul 17, 2014 1 min read

Victoria De Belilovsky

OWASP

OWASP Top 10 - A10 Unvalidated Redirects and Forwards

Description If a user is redirected or forwarded to a page defined by an unverified…

Read More


Jan 29, 2014 2 min read

Philippe Cery

OWASP

OWASP Top 10 - A9 Using Components with Known Vulnerabilities

Description Known software vulnerabilities are available to everyone on the Internet. If an attacker knows…

Read More


Jan 28, 2014 3 min read

Philippe Cery

OWASP

OWASP Top 10 - A8 Cross-Site Request Forgery (CSRF)

Description An attacker sends a request to a website you are authenticated on to execute…

Read More


Jan 14, 2014 4 min read

Philippe Cery

OWASP

OWASP Top 10 - A7 Missing Function Level Access Control

Description In a web application with different user roles, authentication is not enough. Each request…

Read More


Dec 09, 2013 3 min read

Philippe Cery

OWASP

OWASP Top 10 - A6 Sensitive Data Exposure

Description We have seen in the previous articles that an experienced attacker can easily intercept…

Read More


Nov 18, 2013 4 min read

Philippe Cery

OWASP