Nothing kills an OAuth user experience like Google’s danger screen. It is to be avoided at all costs. But your…
Subtle differences distinguish these OAuth implementations. Knowing these ahead of time can save your head from banging against the wall.
A practical overview of the basics of delegated authentication.
Spring Cleaning can Wait…for now. Spring is here, and we’re all looking for ways to grow and embrace the newest…
Today more than 60% of total internet usage is happening on smartphones. The portability, along with the variety of services…
Everything CloudSponge does and all the tools we use to keep our customers’ sensitive data safe.
We all have until February 2, 2020 to migrate to the new UserInfo endpoint for profile data. I’ve already done it. Here’s what I’ve learned.
Here’s what Google really wants when they ask for a “demo video that showcases the process to request an OAuth token”
Google has started to individually review apps requesting access to user’s contact data. This tutorial walks you through how to prepare and apply for an app review.
Jasmine 2 lost the –junitreport and –output params