SlideShare a Scribd company logo
1 of 45
Download to read offline
OAuth 2.0 for developers - the
technology you need but never
really learned
Mikkel	Flindt	Heisterberg	
OnTime®	by	IntraVision
PLATINUM	&	CHAMPAGNE	SPONSORS	
GOLD	SPONSORS	
SILVER	SPONSORS	
BRONZE	SPONSORS
Agenda
•  The	problem	we	are	trying	to	solve	
•  Demo	(OAuth	for	users	i.e.	almost	real	people)	
•  The	flow…	
•  OAuth	for	administrators	
•  OAuth	for	developers	i.e.	real	people	
•  Q&A	
Mikkel	Flindt	Heisterberg	
	
TwiQer:	@lekkim	
E-mail:	mV@intravision.dk	
hQp://lekkimworld.com	
hQp://slideshare.net/lekkim
The problem we are trying to solve
The problem we are trying to solve
Give	me	your	Social	
site	username	and	
password	and	we	can	
play…
The problem we are trying to solve
Doesn’t	really	trust	that	
shiny	new	site	–	or	IBM	
Connec>ons	for	that	
ma@er…	
Give	me	your	Social	
site	username	and	
password	and	we	can	
play…
The problem we are trying to solve
I	support	OAuth		2.0	
and	don’t	want	your	
creden>als	–	just	
authorize	me	to	work	
on	your	behalf…
The problem we are trying to solve
1	
2	
3
it’s about le,ng a service 
access user data without 
knowing the users creden7als... 
- or without the user being there...
demo
Demo safety
it’s	not	as	simple	as	that		
but	almost...
The flow…
CLIENT	
PROVIDER	
USER	
1
The flow…
CLIENT	
PROVIDER	
USER	
2
The flow…
CLIENT	
PROVIDER	
USER	
3
The flow…
CLIENT	
PROVIDER	
USER	
4
The flow…
CLIENT	
PROVIDER	
USER	
5
The flow…
CLIENT	
PROVIDER	
USER	
6
The flow…
CLIENT	
PROVIDER	
USER	
7
The flow…
CLIENT	
PROVIDER	
USER	
8
The flow…
CLIENT	
PROVIDER	
USER	
9
but	less	cartoony	and	with	
real	words	this	Zme...
1) User accesses site and logs in
CLIENT	
PROVIDER	
USER	
1
2) The site checks to see if it has Tokens for the Provider
in its credenGal store
CLIENT	
PROVIDER	
USER	
2
3) The site sends a redirecGon to the client telling it to
go authorize it at the Provider. The URL contains the
Client redirect_uri and client_id
CLIENT	
PROVIDER	
USER	
3
4) The user use the redirect URL and go the provider
and log ins if not already logged in. Then he authorizes
the Client
CLIENT	
PROVIDER	
USER	
4
5) The Provider returns a Gme limited
authorizaGon_code in a redirecGon URL to the user
CLIENT	
PROVIDER	
USER	
5
6) The User sends the authorizaGon_code to the Client
CLIENT	
PROVIDER	
USER	
6
7) Out-of-band the Client sends the authorizaGon_code,
it’s client_id, redirect_uri and secret to the Provider
CLIENT	
PROVIDER	
USER	
7
8) The Provider exchange the authorizaGon_code for a
short lived access_token (yellow) and a longer lived
refresh_token (blue)
CLIENT	
PROVIDER	
USER	
8
9) When the User now access the site it can use the
access_token to work as the User. Even if the user is not
there i.e. not logged into the site…
CLIENT	
PROVIDER	
USER	
9
If	not	you	should	ask	now…
WSADMIN
COMING UP
OAuth for administrators
• IBM	ConnecZons	use	the	built	in	OAuth	
provider	from	WebSphere	ApplicaZon	
Server	
• Administrators	we	responsible	for	
registering	the	app	with	the	OAuth	
provider	
• You	use	–	you	guessed	it	–	wsadmin	
commands	to	do	it…
OAuth for administrators
execfile(”oauthAdmin.py”)
OAuthApplicationRegistrationService.addApplication(
”myapp1”, ”My App1", "https://www.renovations.com/oauth/
redirect")
OAuthApplicationRegistrationService.browseApplications()
[{display_name=My App1, client_id=myapp1,
client_secret=xxxxxxxxxxxxxxxxxxxxxxxxxx, redirect_uri=
https://www.renovations.com/oauth/redirect}]
OAuthApplicationRegistrationService.deleteApplication(”myapp
1”)
The application with the id myapp1 was deleted successfully.
https://www-01.ibm.com/support/knowledgecenter/SSYGQH_5.0.0/
admin/admin/r_admin_common_oauth_manage_list.dita
I’M A
DEVELOPER
OAuth for developers
Generate	the	authorizaZon	redirecZon	URL	and	
have	the	user	visit	it.	Suggest	it’s	done	in	a	
separate	window.	
Syntax
https://<hostname>/oauth2/endpoint/connectionsProvider/
authorize?response_type=code&client_id=<client_id>
&callback_uri=<callback_uri>
Example
https://social.example.com/oauth2/endpoint/
connectionsProvider/authorize?
response_type=code&client_id=myapp1&callback_uri=
https://myapp.shinysite.com/oauth20_cb
OAuth for developers
Generate	the	authorizaZon	redirecZon	URL	and	
have	the	user	visit	it.	Suggest	it’s	done	in	a	
separate	window.	
Syntax
https://<hostname>/oauth2/endpoint/connectionsProvider/
authorize?response_type=code&client_id=<client_id>
&callback_uri=<callback_uri>
Example
https://social.example.com/oauth2/endpoint/
connectionsProvider/authorize?
response_type=code&client_id=myapp1&callback_uri=
https://myapp.shinysite.com/oauth20_cb
Must	match	exactly		what	the	Provider	have	on	record…
OAuth for developers
The	user	logs	in	to	the	Provider	(if	not	already)	and	
authorizes	you	app….	Hopefully...
OAuth for developers
The	Provider	sends	back	a	redirecZon	URL	to	the	
User	containing	an	authorizaZon	code	causing	
the	User	to	send	it	to	the	Client	
	
Syntax
https://<client_redirection_uri>?code=<authorization_code>
https://<client_redirection_uri>?oauth_error=<error_code>
Example
https://myapp.shinysite.com/oauth20_cb
?code=user_specific_auth_code
OAuth for developers
Client	POST’s	the	authorizaZon	code,	client	ID,	
redirecZon	URI	and	client	secret	to	the	Provider	
out-of-band	(server	to	server,	not	through	User)	
Syntax
POST /oauth2/endpoint/connectionsProvider/token HTTP/1.0
Host: <hostname>
Content-Length: <length>
Connection: Close
client_secret=<client_secret>&client_id=<client_id>&grant_type=authorization
_code&code=<auth_code>&callback_uri=<callback_uri>
Example
POST /oauth2/endpoint/connectionsProvider/token HTTP/1.0
Host: social.example.com
Content-Length: 161
Connection: Close
client_secret=my_secret_string&client_id=myapp1
&grant_type=authorization_code&code=user_specific_auth_code
&callback_uri=https://myapp.shinysite.com/oauth20_cb
OAuth for developers
Provider	responds	with	(JSON)	response	with	
access	token,	refresh	token	and	expiry	info.	It	
would	be	wise	that	the	client	saves	the	tokens…	
Example
{
"access_token”: "d86o7UP0gj2c...GVzTPADsFv7”,
"token_type": "Bearer",
"expires_in": 43200,
"scope": "",
"refresh_token": "EWcVt5uaaXC9Pc...pTTgvrLRrs56gR”
}
OAuth for developers
To	make	requests	on	behalf	of	the	User	the	Client	
needs	to	set	the	access	token	in	a	header	
Example
GET /connections/opensocial/oauth/rest
/activitystreams/@me/@all/@all HTTP/1.0
Host: social.example.com
Authorization: Bearer d86o7UP0gj2c...GVzTPADsFv7
Connection: Close
If	the	Client	use	an	access	token	and	receive	a	401	back	from	the	Provider	it	
should	aQempt	the	refresh	token	to	–	well	–	refresh	the	access	token.	If	that	
also	fails	the	User	probably	revoked	access...
Mikkel	Flindt	Heisterberg	
	
TwiQer:	@lekkim	
E-mail:	mV@intravision.dk	
hQp://lekkimworld.com	
hQp://slideshare.net/lekkim

More Related Content

Viewers also liked

The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...
The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...
The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...LetsConnect
 
The Butterfly Effect – or how you can measure and improve business productivity
The Butterfly Effect – or how you can measure and improve business productivity The Butterfly Effect – or how you can measure and improve business productivity
The Butterfly Effect – or how you can measure and improve business productivity LetsConnect
 
Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...
Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...
Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...LetsConnect
 
Auto-create activities – Let’s get rid of checklists
Auto-create activities – Let’s get rid of checklistsAuto-create activities – Let’s get rid of checklists
Auto-create activities – Let’s get rid of checklistsLetsConnect
 
IBM Connections Antipatterns
IBM Connections AntipatternsIBM Connections Antipatterns
IBM Connections AntipatternsLetsConnect
 
How connected systems are transforming the Future of Work
How connected systems are transforming the Future of Work How connected systems are transforming the Future of Work
How connected systems are transforming the Future of Work LetsConnect
 
10 insights to foster enterprise social adoption, that you already know
10 insights to foster enterprise social adoption, that you already know10 insights to foster enterprise social adoption, that you already know
10 insights to foster enterprise social adoption, that you already knowLetsConnect
 
Viral Adoption of Connections via Activities - Increase User Productivity and...
Viral Adoption of Connections via Activities - Increase User Productivity and...Viral Adoption of Connections via Activities - Increase User Productivity and...
Viral Adoption of Connections via Activities - Increase User Productivity and...LetsConnect
 
Accelerate social adoption social connections 2015
Accelerate social adoption social connections 2015Accelerate social adoption social connections 2015
Accelerate social adoption social connections 2015LetsConnect
 
Enrich your customer experience by socialising it using IBM Connections
Enrich your customer experience by socialising it using IBM Connections Enrich your customer experience by socialising it using IBM Connections
Enrich your customer experience by socialising it using IBM Connections LetsConnect
 
No, I’m not retired!
No, I’m not retired!No, I’m not retired!
No, I’m not retired!LetsConnect
 
What’s Coming in IBM Connections Next?
What’s Coming in IBM Connections Next? What’s Coming in IBM Connections Next?
What’s Coming in IBM Connections Next? LetsConnect
 
From Social What to Social WOW! How to design social user experiences that ma...
From Social What to Social WOW! How to design social user experiences that ma...From Social What to Social WOW! How to design social user experiences that ma...
From Social What to Social WOW! How to design social user experiences that ma...LetsConnect
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CloudIDSummit
 
Managing Meeting Minutes – A concept for a Connections addon
Managing Meeting Minutes – A concept for a Connections addonManaging Meeting Minutes – A concept for a Connections addon
Managing Meeting Minutes – A concept for a Connections addonLetsConnect
 
Using IBM Domino Data in IBM Connections – a real life story
Using IBM Domino Data in IBM Connections – a real life storyUsing IBM Domino Data in IBM Connections – a real life story
Using IBM Domino Data in IBM Connections – a real life storyLetsConnect
 
The anatomy of the perfect collaboration use case
The anatomy of the perfect collaboration use caseThe anatomy of the perfect collaboration use case
The anatomy of the perfect collaboration use caseLetsConnect
 
Rock the ActivityStream API
Rock the ActivityStream APIRock the ActivityStream API
Rock the ActivityStream APILetsConnect
 
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...CloudIDSummit
 
Extend and Surround – how to integrate IBM Software at customers using Adobe ...
Extend and Surround – how to integrate IBM Software at customers using Adobe ...Extend and Surround – how to integrate IBM Software at customers using Adobe ...
Extend and Surround – how to integrate IBM Software at customers using Adobe ...LetsConnect
 

Viewers also liked (20)

The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...
The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...
The Latest, Ultimative Final Version, Current Release, Approved, Last Minute ...
 
The Butterfly Effect – or how you can measure and improve business productivity
The Butterfly Effect – or how you can measure and improve business productivity The Butterfly Effect – or how you can measure and improve business productivity
The Butterfly Effect – or how you can measure and improve business productivity
 
Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...
Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...
Win, Win, Win: Changing Attitudes, Adopting Social and Going Green – A Custom...
 
Auto-create activities – Let’s get rid of checklists
Auto-create activities – Let’s get rid of checklistsAuto-create activities – Let’s get rid of checklists
Auto-create activities – Let’s get rid of checklists
 
IBM Connections Antipatterns
IBM Connections AntipatternsIBM Connections Antipatterns
IBM Connections Antipatterns
 
How connected systems are transforming the Future of Work
How connected systems are transforming the Future of Work How connected systems are transforming the Future of Work
How connected systems are transforming the Future of Work
 
10 insights to foster enterprise social adoption, that you already know
10 insights to foster enterprise social adoption, that you already know10 insights to foster enterprise social adoption, that you already know
10 insights to foster enterprise social adoption, that you already know
 
Viral Adoption of Connections via Activities - Increase User Productivity and...
Viral Adoption of Connections via Activities - Increase User Productivity and...Viral Adoption of Connections via Activities - Increase User Productivity and...
Viral Adoption of Connections via Activities - Increase User Productivity and...
 
Accelerate social adoption social connections 2015
Accelerate social adoption social connections 2015Accelerate social adoption social connections 2015
Accelerate social adoption social connections 2015
 
Enrich your customer experience by socialising it using IBM Connections
Enrich your customer experience by socialising it using IBM Connections Enrich your customer experience by socialising it using IBM Connections
Enrich your customer experience by socialising it using IBM Connections
 
No, I’m not retired!
No, I’m not retired!No, I’m not retired!
No, I’m not retired!
 
What’s Coming in IBM Connections Next?
What’s Coming in IBM Connections Next? What’s Coming in IBM Connections Next?
What’s Coming in IBM Connections Next?
 
From Social What to Social WOW! How to design social user experiences that ma...
From Social What to Social WOW! How to design social user experiences that ma...From Social What to Social WOW! How to design social user experiences that ma...
From Social What to Social WOW! How to design social user experiences that ma...
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0
 
Managing Meeting Minutes – A concept for a Connections addon
Managing Meeting Minutes – A concept for a Connections addonManaging Meeting Minutes – A concept for a Connections addon
Managing Meeting Minutes – A concept for a Connections addon
 
Using IBM Domino Data in IBM Connections – a real life story
Using IBM Domino Data in IBM Connections – a real life storyUsing IBM Domino Data in IBM Connections – a real life story
Using IBM Domino Data in IBM Connections – a real life story
 
The anatomy of the perfect collaboration use case
The anatomy of the perfect collaboration use caseThe anatomy of the perfect collaboration use case
The anatomy of the perfect collaboration use case
 
Rock the ActivityStream API
Rock the ActivityStream APIRock the ActivityStream API
Rock the ActivityStream API
 
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
 
Extend and Surround – how to integrate IBM Software at customers using Adobe ...
Extend and Surround – how to integrate IBM Software at customers using Adobe ...Extend and Surround – how to integrate IBM Software at customers using Adobe ...
Extend and Surround – how to integrate IBM Software at customers using Adobe ...
 

Similar to OAuth 2.0 for developers – the technology you need but never really learned

Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud CA API Management
 
Devteach 2017 OAuth and Open id connect demystified
Devteach 2017 OAuth and Open id connect demystifiedDevteach 2017 OAuth and Open id connect demystified
Devteach 2017 OAuth and Open id connect demystifiedTaswar Bhatti
 
OAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST ServicesOAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST ServicesIntuit Developer
 
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016Spark Solutions
 
OAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessOAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessMehdi Medjaoui
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CloudIDSummit
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public SafetyAdam Lewis
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteDavid Keener
 
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidDeveloper Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidFIDO Alliance
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
O365 saturday: How to (remote) control office 365 with windows azure-slideshare
O365 saturday: How to (remote) control office 365 with windows azure-slideshareO365 saturday: How to (remote) control office 365 with windows azure-slideshare
O365 saturday: How to (remote) control office 365 with windows azure-slideshareatwork
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyMaki Toshio
 
How PayPal uses Open Identity
How PayPal uses Open Identity How PayPal uses Open Identity
How PayPal uses Open Identity PayPal
 
7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App Development7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App DevelopmentJoonas Westlin
 
IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...
IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...
IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...IBM Connections Developers
 
IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...
IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...
IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...paulbastide
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground UpMichael Bleigh
 

Similar to OAuth 2.0 for developers – the technology you need but never really learned (20)

Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud
 
Devteach 2017 OAuth and Open id connect demystified
Devteach 2017 OAuth and Open id connect demystifiedDevteach 2017 OAuth and Open id connect demystified
Devteach 2017 OAuth and Open id connect demystified
 
OAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST ServicesOAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST Services
 
Lecture 20101124
Lecture 20101124Lecture 20101124
Lecture 20101124
 
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
 
OAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessOAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guess
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking Site
 
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidDeveloper Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
O365 saturday: How to (remote) control office 365 with windows azure-slideshare
O365 saturday: How to (remote) control office 365 with windows azure-slideshareO365 saturday: How to (remote) control office 365 with windows azure-slideshare
O365 saturday: How to (remote) control office 365 with windows azure-slideshare
 
Paypal
PaypalPaypal
Paypal
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
 
How PayPal uses Open Identity
How PayPal uses Open Identity How PayPal uses Open Identity
How PayPal uses Open Identity
 
7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App Development7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App Development
 
IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...
IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...
IBM Connect 2014 - SHOW501: Mastering Social Development Using the IBM Collab...
 
IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...
IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...
IBM Connect 2014 SHOW501 Mastering Social Development Using the IBM Collabora...
 
Building a Slack Bot Workshop @ Nearsoft OctoberTalks 2017
Building a Slack Bot Workshop @ Nearsoft OctoberTalks 2017Building a Slack Bot Workshop @ Nearsoft OctoberTalks 2017
Building a Slack Bot Workshop @ Nearsoft OctoberTalks 2017
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground Up
 

More from LetsConnect

Installing Component Pack 6.0.0.6
Installing Component Pack 6.0.0.6Installing Component Pack 6.0.0.6
Installing Component Pack 6.0.0.6LetsConnect
 
Oh $h@# - How to deal with emotional outbursts and hate in social situations
Oh $h@# - How to deal with emotional outbursts and hate in social situationsOh $h@# - How to deal with emotional outbursts and hate in social situations
Oh $h@# - How to deal with emotional outbursts and hate in social situationsLetsConnect
 
It is not About Connections vs Office 365 - You can have the best of the both...
It is not About Connections vs Office 365 - You can have the best of the both...It is not About Connections vs Office 365 - You can have the best of the both...
It is not About Connections vs Office 365 - You can have the best of the both...LetsConnect
 
Using ibm connections to enhance university courses
Using ibm connections to enhance university coursesUsing ibm connections to enhance university courses
Using ibm connections to enhance university coursesLetsConnect
 
IBM Connections 6 Component Pack
IBM Connections 6 Component PackIBM Connections 6 Component Pack
IBM Connections 6 Component PackLetsConnect
 
IBM Connections 6.0 CR3 New Features
IBM Connections 6.0 CR3 New FeaturesIBM Connections 6.0 CR3 New Features
IBM Connections 6.0 CR3 New FeaturesLetsConnect
 
10 years of IBM Connections
10 years of IBM Connections10 years of IBM Connections
10 years of IBM ConnectionsLetsConnect
 
IBM Collaboration Framework in action: Customer success stories
IBM Collaboration Framework in action: Customer success storiesIBM Collaboration Framework in action: Customer success stories
IBM Collaboration Framework in action: Customer success storiesLetsConnect
 
Design for the Digital Workspace
Design for the Digital WorkspaceDesign for the Digital Workspace
Design for the Digital WorkspaceLetsConnect
 
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream CollaborationNew Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream CollaborationLetsConnect
 
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...LetsConnect
 
There is nothing more practical than a good theory
There is nothing more practical than a good theoryThere is nothing more practical than a good theory
There is nothing more practical than a good theoryLetsConnect
 
Kubernetes Basics for Connections Admins
Kubernetes Basics for Connections AdminsKubernetes Basics for Connections Admins
Kubernetes Basics for Connections AdminsLetsConnect
 
Intelligent Collaboration driving Digital Transformation
Intelligent Collaboration driving Digital TransformationIntelligent Collaboration driving Digital Transformation
Intelligent Collaboration driving Digital TransformationLetsConnect
 
Developing IBM Connections Community Apps using Domino
Developing IBM Connections Community Apps using DominoDeveloping IBM Connections Community Apps using Domino
Developing IBM Connections Community Apps using DominoLetsConnect
 
IBM Connections - Have it YOUR Way!
IBM Connections - Have it YOUR Way!IBM Connections - Have it YOUR Way!
IBM Connections - Have it YOUR Way!LetsConnect
 
You Get What You Give
You Get What You GiveYou Get What You Give
You Get What You GiveLetsConnect
 
Building Custom ibm Watson Workspace Templates to make you and your team more...
Building Custom ibm Watson Workspace Templates to make you and your team more...Building Custom ibm Watson Workspace Templates to make you and your team more...
Building Custom ibm Watson Workspace Templates to make you and your team more...LetsConnect
 
ICS INtegration with Node-RED and Open Source
ICS INtegration with Node-RED and Open SourceICS INtegration with Node-RED and Open Source
ICS INtegration with Node-RED and Open SourceLetsConnect
 
Communities as the fundament of social learning
Communities as the fundament of social learningCommunities as the fundament of social learning
Communities as the fundament of social learningLetsConnect
 

More from LetsConnect (20)

Installing Component Pack 6.0.0.6
Installing Component Pack 6.0.0.6Installing Component Pack 6.0.0.6
Installing Component Pack 6.0.0.6
 
Oh $h@# - How to deal with emotional outbursts and hate in social situations
Oh $h@# - How to deal with emotional outbursts and hate in social situationsOh $h@# - How to deal with emotional outbursts and hate in social situations
Oh $h@# - How to deal with emotional outbursts and hate in social situations
 
It is not About Connections vs Office 365 - You can have the best of the both...
It is not About Connections vs Office 365 - You can have the best of the both...It is not About Connections vs Office 365 - You can have the best of the both...
It is not About Connections vs Office 365 - You can have the best of the both...
 
Using ibm connections to enhance university courses
Using ibm connections to enhance university coursesUsing ibm connections to enhance university courses
Using ibm connections to enhance university courses
 
IBM Connections 6 Component Pack
IBM Connections 6 Component PackIBM Connections 6 Component Pack
IBM Connections 6 Component Pack
 
IBM Connections 6.0 CR3 New Features
IBM Connections 6.0 CR3 New FeaturesIBM Connections 6.0 CR3 New Features
IBM Connections 6.0 CR3 New Features
 
10 years of IBM Connections
10 years of IBM Connections10 years of IBM Connections
10 years of IBM Connections
 
IBM Collaboration Framework in action: Customer success stories
IBM Collaboration Framework in action: Customer success storiesIBM Collaboration Framework in action: Customer success stories
IBM Collaboration Framework in action: Customer success stories
 
Design for the Digital Workspace
Design for the Digital WorkspaceDesign for the Digital Workspace
Design for the Digital Workspace
 
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream CollaborationNew Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
New Ways to Deliver Business Outcomes with INtelligent Workstream Collaboration
 
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
Power up your Salesforce Opportunities by using IBM Watson Workspace as your ...
 
There is nothing more practical than a good theory
There is nothing more practical than a good theoryThere is nothing more practical than a good theory
There is nothing more practical than a good theory
 
Kubernetes Basics for Connections Admins
Kubernetes Basics for Connections AdminsKubernetes Basics for Connections Admins
Kubernetes Basics for Connections Admins
 
Intelligent Collaboration driving Digital Transformation
Intelligent Collaboration driving Digital TransformationIntelligent Collaboration driving Digital Transformation
Intelligent Collaboration driving Digital Transformation
 
Developing IBM Connections Community Apps using Domino
Developing IBM Connections Community Apps using DominoDeveloping IBM Connections Community Apps using Domino
Developing IBM Connections Community Apps using Domino
 
IBM Connections - Have it YOUR Way!
IBM Connections - Have it YOUR Way!IBM Connections - Have it YOUR Way!
IBM Connections - Have it YOUR Way!
 
You Get What You Give
You Get What You GiveYou Get What You Give
You Get What You Give
 
Building Custom ibm Watson Workspace Templates to make you and your team more...
Building Custom ibm Watson Workspace Templates to make you and your team more...Building Custom ibm Watson Workspace Templates to make you and your team more...
Building Custom ibm Watson Workspace Templates to make you and your team more...
 
ICS INtegration with Node-RED and Open Source
ICS INtegration with Node-RED and Open SourceICS INtegration with Node-RED and Open Source
ICS INtegration with Node-RED and Open Source
 
Communities as the fundament of social learning
Communities as the fundament of social learningCommunities as the fundament of social learning
Communities as the fundament of social learning
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

OAuth 2.0 for developers – the technology you need but never really learned