-
Understanding OAuth 2.0 with Identity and Authorization Servers
In modern application architectures, secure user authentication and authorization are essential. OAuth 2.0 has become the de facto standard for enabling secure delegated access to resources, particularly when working across multiple services and platforms. The diagram above illustrates the flow of authentication and authorization using an Identity Provider (like Google), an Authorization Server, and a…
-
Web Assets and Security Risk
In application security world blacklisting and whitelisting validations are very popular. This basically indicates what should be allowed and what shouldn’t be allowed. I was thinking about some of the web applications deployment structure and paying attention on the way various files are packaged and deployed. I found one interesting thing about web assets like…