"authentication" tag

Setting Up OpenAM for Web Authentication

OpenAM provides a system for integrating diverse Web applications-to share common authentication and authorisation systems. It can protect applications running on any Web or application server. With a centralised login for all applications,…

Set Up a Certificate Authority in RHEL5

Security certificates are widely used for authentication. This article explores how to set up a Certificate Authority in RHEL5. Security certificates are basically used for authentication purposes and you must have encountered a…

A Primer On WSGI

This article shows you how to make money and have fun with some code, Python and the Internet. It all starts with a four letter acronym, WSGI – a spec that makes it…

Hacker alert!

Modify-function-return-value Hack! — Part 1

Sometimes it’s helpful to think from a hacker’s perspective. The information obtained can be used to write better code and a secure application. An application shipped in release mode (without any debug information)…

Specify complex access controls with ease

Gitolite: Administer a Central Git Repository without Going Insane

Over the past few years, centralised version control systems like SVN have steadily given way to distributed systems like Git or Mercurial — the former undoubtedly the more powerful and popular of the…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.