"authentication" tag
The Best Open Source Storage Solutions: An Overview

The Best Open Source Storage Solutions: An Overview

Millions of bytes of data are being generated every moment, every day, around the world, and this volume will only increase in the future. The storage of all these bytes has become a…

Setting Up OpenAM for Web Authentication

OpenAM provides a system for integrating diverse Web applications-to share common authentication and authorisation systems. It can protect applications running on any Web or application server. With a centralised login for all applications,…

Set Up a Certificate Authority in RHEL5

Security certificates are widely used for authentication. This article explores how to set up a Certificate Authority in RHEL5. Security certificates are basically used for authentication purposes and you must have encountered a…

A Primer On WSGI

This article shows you how to make money and have fun with some code, Python and the Internet. It all starts with a four letter acronym, WSGI – a spec that makes it…

Hacker alert!

Modify-function-return-value Hack! — Part 1

Sometimes it’s helpful to think from a hacker’s perspective. The information obtained can be used to write better code and a secure application. An application shipped in release mode (without any debug information)…

Specify complex access controls with ease

Gitolite: Administer a Central Git Repository without Going Insane

Over the past few years, centralised version control systems like SVN have steadily given way to distributed systems like Git or Mercurial — the former undoubtedly the more powerful and popular of the…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.