SlideShare a Scribd company logo
1 of 46
Download to read offline
Autentifikācija un autorizācija
Mārtiņš Ķemme
SIA Autentica, vecākais konsultants
Mārtiņš Ķemme
SIA	Autentica,	vecākais konsultants
IT	procesu konsultants,	projektu vadītājs,	konsultants
Certified	Information	Systems	Security	Professional	(ISC)²
Certified	Information	Security	Manager	(ISACA)
Certified	Penetration	Testing	Engineer	(Mile2)
autentifikācija
identitātes	pārbaude
autorizācija
tiesību	piešķiršana
autentifikācija
Ko	lietotājs	zina?
(PIN,	parole)
Kas	lietotājam	ir/pieder?
(viedkarte,	kodu	kalkulators)
Kas	lietotājs	ir?
(biometrija,	balss	atpazīšana)
Divu	faktoru	autentifikācija
autentifikācijas riski
lietotājs	netiek	autentificēts
lietotājs	tiek	autentificēts	nepareizi
uzbrukumi autentifikācijas sistēmām
Man-in-the-middle
Paroļu	datubāzes	nozagšana	offline uzbrukumiem
Sociālā	inženierija
Kontu	pārskaitīšana
DoS uzbrukums	ar	paroļu	atiestatīšanu	/	kontu	bloķēšanu
MitM aizsardzība
šifrēts	savienojums	- https
(autentiskums,	integritāte,	konfidencialitāte)
keylogger injection over http
rogue access points
Paroles	nekad	nesūta uz	epastu
pat	šifrētas	paroles	zog
offline uzbrukumu	bīstamība
nav	laika	ierobežojuma
daudz	resursu
sociālā	inženierija
Vai	mans	konts	jau	
nav	uzlauzts?
https://haveibeenpwned.com/
paroles	atjaunošana
nepieļaut	epasta piespamošanu
ģenerēt	unikālus	atjaunošanas	kodus
nepārtraukt esošu	sesiju
īpaša	drošība:
Neizpaust informāciju,	uz kuru	epastu tiks nosūtīta info
Pirms sūtīšana papildus pieprasīt drošības jautājumu
paroles	maiņa
pieprasīt	esošo	paroli
aizsardzība pret	brute force un	minēšanu
Ierobežot pieslēgšanās iespējas pēc IP	adreses
(bet	uzbrucējiem var būt vairākas IP	un	legāliem klientiem var būt viena IP)
Ierobežot ātrumu
(eksponenciāli palielināt	ilgumu,	bet	uzbrucēji	var	dzēst	cookies)
Uzdot papildu jautājumus vai	captcha
(pēc	neveiksmīgiem	mēģinājumiem,	piem.,	jautājumi	par	pēdējām	transakcijām)
Ierobežot pēc “pirkstu nospiedumiem”
(apskata pieprasījuma atribūtus (pārlūks,	versija)
ierobežot visos	kanālos	(sitewide)
konta	bloķēšana
(automātiska	atbloķēšanās)
aizsardzība pret	kontu	pārskaitīšanu
pie	konta	reģistrēšanas	nerādīt,	ka	tāds	konts	
jau	ir	reģistrēts
pie	pieslēgšanās	nerādīt,	kas	ievadīts	nepareizi
autentifikācijas aizsardzība
Ierobežošana pēc	pieslēgšanās	laika
Papildus autentifkācijas faktors
problēmas	ar	captcha
autentifikācijas labā	prakse
Reautentifikācija pie	kritiskām darbībām
Papildu kontrole
sistēmas	kontu	autentifikācija
Autentifikācija	ar	sertifikātiem
Neiešūšana	kodā
username: <%= ENV['POSTGRES_USERNAME'] %>
password: <%= ENV['POSTGRES_PASSWORD'] %>
Neglabāšana	repozitorijā
paroļu	glabāšana
Nekad	plain tekstā
Ja	paroli var uzzināt (kaut vai no	operatora),	tad	to	sistēmu
nevajag lietot
http://plaintextoffenders.com/
Nelietot vājas jaucējfunkcijas
Base64	nav	jaucējfunkcija!
https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
Lietot salt (un	varbūt arī	pepper)
Drošības jautājumu	atbildes	arī	hashed
paroļu	stiprība
paroles	vs.	frāzes
dzelzsgriezējam pasaule ir jasagriež
Qu1ck8r0wnF0x1
paroļu stiprības	pārbaude
neierobežot	garumu	un	sarežģītību
pārbaudīt	uz	zināmām	parolēm	
(http://weakpass.com/)
dot	padomus	lietotājam:	eBay	reģistrācija
paroļu	glabāšana	(pašiem)
notepad
KeePass /	KeePassX
LastPass
1Password
autentifikācijas	protokoli	/	veidi
Formu	bāzēts	(tikai	pār	TLS)
Basic /	Digest
PKI	- sertifikāti	/	viedkartes
OAuth
Kerberos
FIDO	UAF/U2F
Secure Remote Password (SRP)
(divpusēja	autentifikācija)
Security	Assertion	Markup	Language	(SAML)
(autentifikācijas	un	autorizācijas	datu	apmaiņas	formāts)
autentifikācijas	pakalpojumu	sniedzēji
bankas
facebook
Google
Twitter
draugiem.lv pase
Microsoft	Account
banku	autentifikācijas	problēmas
Anna	de	Butkeviča-Mirska
Klotilde van	der	Stūla-Vollebeka
Anna	Mirska de	Butkeviča
Klotilde Vollebeka van	der	Stūla.
lietotāju	reģistrācija
epastu lietošana	lietotājvārdu	vietā
viegli	atcerēties,	mazāk	lauku,	bet	nevar	rādīt	publiski	
lietotājvārdu
reģistrēto	epastu pārbauda...
...	nosūtot	epastu
sesiju	uzturēšana
sesiju	uzturēšana
neizgudrot	pašiem	sesiju	pārvaldību
neglabāt	sesijas	cepumā	”lasāmus”	datus
izvairīties no	sesijas	fiksācijas
pēc autentifikācijas	un	atslēgšanās	mainīt	sesijas	
identifikatoru
nepieļaut	sesijas	identifikatora	padošanu	saitē
autentifikācijas informāciju	nesūtīt	GET	
pieprasījumos
tie	saglabājas	žurnālu	failos
cepumi
Secure	Attribute	- Whenever	a	cookie	contains	sensitive	information	or	is	a	
session	token,	then	it	should	always	be	passed	using	an	encrypted	tunnel.	
Pārlūks šo	cepumu	sūtīs	tikai	pār	TLS	savienojumu.
HttpOnly Attribute	- This	attribute	should	always	be	set	even	though	not	
every	browser	supports	it.	This	attribute	aids	in	securing	the	cookie	from	
being	accessed	by	a	client	side	script,	it	does	not	eliminate	cross	site	
scripting	risks	but	does	eliminate	some	exploitation	vectors.	
Javascript-am	šis	cepums	nav	pieejams.
cepumi
Domain	Attribute - Verify	that	the	domain	has	not	been	set	too	loosely.	As	
noted	above,	it	should	only	be	set	for	the	server	that	needs	to	receive	the	
cookie.	For	example	if	the	application	resides	on	server	app.mysite.com,	
then	it	should	be	set	to	";	domain=app.mysite.com"	and	NOT	";	
domain=.mysite.com"	as	this	would	allow	other	potentially	vulnerable	
servers	to	receive	the	cookie.
Path	Attribute	- Verify	that	the	path	attribute,	just	as	the	Domain	attribute,	
has	not	been	set	too	loosely.	Even	if	the	Domain	attribute	has	been	
configured	as	tight	as	possible,	if	the	path	is	set	to	the	root	directory	"/"	
then	it	can	be	vulnerable	to	less	secure	applications	on	the	same	server.	For	
example,	if	the	application	resides	at	/myapp/,	then	verify	that	the	cookies	
path	is	set	to	";	path=/myapp/"	and	NOT	";	path=/".
cepumi
Expires	Attribute	- If	this	attribute	is	set	to	a	time	in	the	future	verify	that	
the	cookie	does	not	contain	any	sensitive	information.	For	example,	if	a	
cookie	is	set	to	";	expires=Sun,	31-Jul-2016	13:45:29	GMT"	and	it	is	
currently	July	31st	2014,	then	the	tester	should	inspect	the	cookie.	If	the	
cookie	is	a	session	token	that	is	stored	on	the	user's	hard	drive	then	an	
attacker	or	local	user	(such	as	an	admin)	who	has	access	to	this	cookie	can	
access	the	application	by	resubmitting	this	token	until	the	expiration	date	
passes.
clickjacking
Clickjacking	example
X-Frame-Options	Header	Types
DENY,	which	prevents	any	domain	from	framing	the	content.	The	"DENY"	
setting	is	recommended	unless	a	specific	need	has	been	identified	for	
framing.
SAMEORIGIN,	which	only	allows	the	current	site	to	frame	the	content.
ALLOW-FROM	uri,	which	permits	the	specified	'uri'	to	frame	this	page.	
(e.g.,	ALLOW-FROM	http://www.example.com)
clickjacking aizsardzība	ar	js
<style id="antiClickjack">body{display:none !important;}</style>
<script type="text/javascript">
if (self === top) {
var antiClickjack document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
top.location = self.location;
}
</script>
AUTORIZĀCIJA
Now that I know who you are, let’s see if I will let you do what you
want.
autorizācijas	principi
lomas
parasti balstītas uz	pienākumiem	vai	amatu
grupas
pieejas	tiesības	piešķir	grupām,	nevis	individuāli
autorizācijas	principi
fiziska	vai	loģiska	atrašanās	vieta
piemēram,	tikai	lokāli	pieslēdzoties,	nevis	attālināti
resursa	izmantošanas	laiks
piemēram,	tikai	darba	laikā
transakcijas	tips
piemēram,	ja	apjoms	lielāks	par	X,	tad	nepieciešama	
vadītāja	apstiprinājums
noklusētās	pieejas	tiesības
NĒ!
least privilege
(need-to-know)
Šis princips nosaka,	ka lietotājiem un	
programmatūrai jābūt minimālās
nepieciešamās pieejas tiesības,	lai varētu
izpildīt savus pienākumus
OWASP	par	lomām
Its	important	to	consider	the	Goldilocks	
principle	when	role	engineering,	in	that	
defining	too	few,	broad	roles	(thereby	
exposing	access	to	functionality	users	
don't	require)	is	as	bad	as	too	many,	
tightly	tailored	roles	(thereby	restricting	
access	to	functionality	users	do	require).
separation of duties
Princips,	kas nosaka,	ka nevienai personai
nevar būt piešķirtas pārāk liela vara vai
atbildība.	Pienākumi un	atbildība jāsadala
starp personām,	lai novērstu ētikas
konfliktus vai varas ļaunprātīgu
izmantošanu
Piemēram,	dokumentu veido viena persona,	bet	apstiprina cita
dinamiska	lomu-bāzēta	pieejas	kontrole
vienai personai var būt gan	ievadītāja,	
gan	apstiprinātāja	lomas,	bet	reizē	tās	
nevar	tikt	pielietotas
KOPSAVILKUMS
Kas	jāvaicā	klientam	par	autentifikāciju
• Kā autentificēt	lietotāju?	(Active Directory,	bankas,	
eID,	Facebook,	MKODS,	citas	puses)
• Vai	būs	Single-Sign-On?	Protokols?
• Vai nepieciešama divu	faktoru autentifikācija?	
Kāda?
• Vai būs reģistrēšanās (signup)?	Kā bloķēt botus?
• Vai būs paroles	atiestatīšana?	Kuri papildu kanāli
pieejami?
• Cik rūpīgi bloķēt brute	force	mēģinājumus?	kādi
mēri pieļaujami?
Kas	jāvaicā	klientam	par	sesijas	saglabāšanu
• Vai pieļaut vienlaicīgi vairākas sesijas?	Ko darīt,	ja	ir?	(Vai
šķirot,	piemēram,	pēc useragent,	ip adreses)
• Vai nepieciešama sesijas beigšana,	aizverot tabu?
• Cik ātri vajag beigt sesiju ar noildzi?	Vai atlikušo sesijas
laiku vajag attēlot lietotāja interfeisā?
• Vai brīdināt lietotājus	par	aizdomīgiem	piekļuves	
gadījumiem,	piemēram,	no	citām	valstīm?	Kā	tās	attēlot?
• Vai	ir	kādi	ierobežojumi	kontu	un	sesiju	datu	glabāšanai?
Kas	jārealizē,	nevaicājot	klientam
• Rūpīgi žurnalēt
• Droši glabāt paroles	(salt	un	varbūt arī	pepper)
• Aizsargāt pret kontu pārskaitīšanu
Paldies!

More Related Content

More from DevClub_lv

Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...DevClub_lv
 
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...DevClub_lv
 
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...DevClub_lv
 
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...DevClub_lv
 
SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...DevClub_lv
 
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...DevClub_lv
 
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...DevClub_lv
 
Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019DevClub_lv
 
Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...DevClub_lv
 
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...DevClub_lv
 
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019DevClub_lv
 
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...DevClub_lv
 
Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...DevClub_lv
 
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019DevClub_lv
 
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...DevClub_lv
 
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019DevClub_lv
 
Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019DevClub_lv
 
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...DevClub_lv
 
HOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINS
HOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINSHOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINS
HOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINSDevClub_lv
 
Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...
Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...
Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...DevClub_lv
 

More from DevClub_lv (20)

Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
 
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
 
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
 
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
 
SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...
 
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
 
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
 
Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019
 
Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...
 
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
 
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
 
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
 
Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...
 
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
 
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
 
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
 
Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019
 
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
 
HOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINS
HOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINSHOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINS
HOW TO EXTEND WEBPACK WITH YOUR OWN PLUGINS
 
Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...
Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...
Messaging in .NET via MassTransit by Arturs Karbone at .NET focused 73rd DevC...
 

"Authentication and Authorisation" by Mārtiņš Ķemme from Autentica at Authentication and Authorisation focused 53rd DevClub.lv