Automating Business Processes with Salesforce Flow TriggersIn the fast-paced world of business, effective and streamlined processes are the key to success. Salesforce, a powerful customer…Feb 20Feb 20
Choosing Between Indexing and DenormalizationWhen it comes to optimizing your application’s performance, both indexing and denormalization are strategies used to enhance the underlying…Feb 11Feb 11
Streamlining Subscription Management with Stripe SchedulesSubscription-based services have become crucial for businesses these days since they provide a reliable source of revenue while offering…Nov 17, 2023Nov 17, 2023
Secure Spring Boot Application with OpenID Connect and Role Based AuthorizationIn this article, I hope to give a step by step approach on how you can secure your Spring Boot application with OpenID Connect Login and…May 20, 20232May 20, 20232
SQL Injections DemystifiedSQL which stands for Structured Query Language is a programming language that was specifically designed to communicate with relational…Jul 11, 2022Jul 11, 2022
How to Configure Flyway for Seamless Database MigrationFlyway is a tool that supports database migrations on multiple types of relational databases. It is open-source and licensed under Apache…Feb 22, 2022Feb 22, 2022
Hello, Kotlin!I was working as a java software engineer for more than 4 years. Recently I joined a firm that uses Kotlin instead of Java and I have been…Jan 30, 20221Jan 30, 20221
Published inIdentity Beyond BordersBest practices in Identifying the Authorization Context of an OAuth2 Token — WSO2 Identity ServerIn this post we’ll discuss on the best practices of identifying the authorized user of an access token and what approach we recommend in…Feb 4, 2020Feb 4, 2020
CSRF in IDP Initiated OpenID ConnectCSRF (Cross-Site Request Forgery) can allow an attacker to coerce a user into unknowingly and unintentionally dispatch responses to an…Jul 24, 20191Jul 24, 20191