freiburg.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Ein Mastodon-Server für Freiburg und Umland betrieben durch den Verein freiburg.social e.V.: https://wir.freiburg.social

Server stats:

534
active users

#oAuth

1 post1 participant0 posts today
Erik Play2Learn<p><span class="h-card" translate="no"><a href="https://chaos.social/@netzpolitik_feed" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>netzpolitik_feed</span></a></span> Haben die <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>EUCommission</span></a></span> Kollegen schon mal von <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> gehört? Ein großer Teil der Anfrage-Verwaltung ist damit technisch schon gelöst.</p>
damienbod<p>Blogged: ASP.NET Core delegated Microsoft OBO access token management (Entra only)</p><p><a href="https://damienbod.com/2025/03/25/asp-net-core-delegated-microsoft-obo-access-token-management-entra-only/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/03/25/asp-n</span><span class="invisible">et-core-delegated-microsoft-obo-access-token-management-entra-only/</span></a></p><p><a href="https://mastodon.social/tags/aspnetcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspnetcore</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/micrsoftidentity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>micrsoftidentity</span></a> <a href="https://mastodon.social/tags/entra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entra</span></a> <a href="https://mastodon.social/tags/entraid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entraid</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openidconnect</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a></p>
Jörn Franke<p>Check your programming frameworks. For example, this is currently only planned in the upcoming major Version of the Spring framework <a href="https://github.com/spring-projects/spring-security/issues/16391" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/spring-projects/spr</span><span class="invisible">ing-security/issues/16391</span></a></p><p>At least for the Rust crate openidconnect-rs this is included in the default example: <a href="https://docs.rs/openidconnect/latest/openidconnect/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.rs/openidconnect/latest/o</span><span class="invisible">penidconnect/</span></a></p><p><a href="https://mastodon.online/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.online/tags/oauth2_1" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth2_1</span></a> <a href="https://mastodon.online/tags/spring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spring</span></a> <a href="https://mastodon.online/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://mastodon.online/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.online/tags/pkce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkce</span></a></p>
Jörn Franke<p>browsing the specs of OAuth 2.1 and found that PKCE is now mandatory for Authorization Code Flow (not only Desktops or frontend-only apps!):<br><a href="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">draft-ietf-oauth-v2-1-12</span></a></p><p>"The authorization code grant is extended with the functionality from PKCE [RFC7636] such that the default method of using the authorization code grant according to this specification requires the addition of the PKCE parameters"</p><p><a href="https://mastodon.online/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.online/tags/oauth2_1" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth2_1</span></a> <a href="https://mastodon.online/tags/pkce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkce</span></a> <a href="https://mastodon.online/tags/authorizationcodeflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authorizationcodeflow</span></a></p>
Khalid Pro Max⚡️<p>I got <a href="https://mastodon.social/tags/Duende" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Duende</span></a> IdentityServer <a href="https://mastodon.social/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> working inside an <span class="h-card" translate="no"><a href="https://dotnet.social/@avaloniaui" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>avaloniaui</span></a></span> app. It's pretty easy, thanks to the Duende.IdentityModel package and the browser abstraction. <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a></p>
The New Oil<p>Fake "Security Alert" issues on <a href="https://mastodon.thenewoil.org/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> use <a href="https://mastodon.thenewoil.org/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> app to hijack accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
teufelswerk<p>Cyberkriminelle nutzen aktuell gefälschte OAuth-Anwendungen, die sich als bekannte Dienste wie Adobe Acrobat, Adobe Drive oder DocuSign ausgeben. Ziel dieser Angriffe ist es, sich Zugriff auf Microsoft-365-Konten zu erschleichen. Im Beitrag erfährst du auch, wie du dich vor solchen Angriffen schützen kannst.</p><p><a href="https://teufelswerk.net/achtung-vor-boesartigen-adobe-und-docusign-oauth-apps-so-schuetzt-du-dein-microsoft-365-konto/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">teufelswerk.net/achtung-vor-bo</span><span class="invisible">esartigen-adobe-und-docusign-oauth-apps-so-schuetzt-du-dein-microsoft-365-konto/</span></a></p><p><a href="https://social.tchncs.de/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://social.tchncs.de/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://social.tchncs.de/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.tchncs.de/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> <a href="https://social.tchncs.de/tags/Adobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Adobe</span></a> <a href="https://social.tchncs.de/tags/DocuSign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DocuSign</span></a> <a href="https://social.tchncs.de/tags/microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft365</span></a> <a href="https://social.tchncs.de/tags/office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>office365</span></a></p>
The New Oil<p>Malicious <a href="https://mastodon.thenewoil.org/tags/Adobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Adobe</span></a>, <a href="https://mastodon.thenewoil.org/tags/DocuSign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DocuSign</span></a> <a href="https://mastodon.thenewoil.org/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> apps target <a href="https://mastodon.thenewoil.org/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-adobe-docusign-oauth-apps-target-microsoft-365-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malicious-adobe-docusign-oauth-apps-target-microsoft-365-accounts/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts</p><p>A widespread phishing campaign has targeted nearly 12,000 GitHub repositories with fake "Security Alert" issues, tricking developers into authorizing a malicious OAuth app that grants attackers full control over their accounts and code.</p><p>😒 <a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</span></a></p><p><a href="https://chaos.social/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://chaos.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://chaos.social/tags/account" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>account</span></a> <a href="https://chaos.social/tags/hijack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hijack</span></a> <a href="https://chaos.social/tags/Facke" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facke</span></a> <a href="https://chaos.social/tags/securityalert" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityalert</span></a> <a href="https://chaos.social/tags/authorization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authorization</span></a> <a href="https://chaos.social/tags/FullControl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FullControl</span></a></p>
skry<p><a href="https://mastodon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> Alert hijack attack <a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</span></a><br><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/dev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dev</span></a> <a href="https://mastodon.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a></p>
NobleMajo<p>I have now installed and tested Authentik for CoreUnit.NET. So far I am satisfied. Keycloak, dex and other IDP's made me dissatisfied in some steps. As a developer I just dont like the container image taging, please use semver so I can pin major/minor versions. </p><p><a href="https://mastodon.social/tags/Authentik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Authentik</span></a> <a href="https://mastodon.social/tags/CoreUnitNET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CoreUnitNET</span></a> <a href="https://mastodon.social/tags/IDP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IDP</span></a> <a href="https://mastodon.social/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> <a href="https://mastodon.social/tags/Dex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dex</span></a> <a href="https://mastodon.social/tags/Containerization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Containerization</span></a> <a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/SoftwareDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareDevelopment</span></a> <a href="https://mastodon.social/tags/SemVer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SemVer</span></a> <a href="https://mastodon.social/tags/VersionControl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VersionControl</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IdentityManagement</span></a> <a href="https://mastodon.social/tags/DeveloperExperience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeveloperExperience</span></a> <a href="https://mastodon.social/tags/TechSatisfaction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechSatisfaction</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSO</span></a> <a href="https://mastodon.social/tags/OAUTH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAUTH</span></a></p>
hikari<p>USSO is a third-party cookie-based SSO (for now), built to work across multiple domains and businesses. It has been in development for over a year by Mahdi Kiani.</p><p>Right now, it's written in Python, but a Go rewrite is coming soon. After the rewrite, OAuth, SAML, and other authentication methods will be added.</p><p>For now, USSO doesn’t have a frontend to manage all SSO operations, but everything is available through an API.</p><p>A couple of microservices also work with USSO:</p><p>A global S3-based file manager</p><p>UFAAS, a Function-as-a-Service platform, optimized for Iran</p><p>UFAAS currently only supports IRT/IRR currencies and integrates with Iranian payment gateways, but accounts can also be manually charged.</p><p>A Rust module for USSO has also been released, making it easier to integrate with Rust-based applications. Additionally, I've recently joined the development team.</p><p>USSO is planned to be used on Parch Linux, and detailed deployment documentation will be written for all major platforms, including cloud, Docker, Kubernetes, and Jails.</p><p>Mahdi Kiani on X: <a href="https://x.com/mahdikiani" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">x.com/mahdikiani</span><span class="invisible"></span></a><br>Project GitHub: <a href="https://github.com/ussoio" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/ussoio</span><span class="invisible"></span></a><br>The File Manager: <a href="https://github.com/ufilesorg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/ufilesorg</span><span class="invisible"></span></a><br>FaaS: <a href="https://github.com/ufaasio" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/ufaasio</span><span class="invisible"></span></a><br>profile manager based on usso: <a href="https://github.com/uprofile" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/uprofile</span><span class="invisible"></span></a><br>rustcrate: <a href="https://crates.io/crates/usso" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">crates.io/crates/usso</span><span class="invisible"></span></a></p><p><a href="https://mastodon.bsd.cafe/tags/USSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USSO</span></a> <a href="https://mastodon.bsd.cafe/tags/SSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSO</span></a> <a href="https://mastodon.bsd.cafe/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> <a href="https://mastodon.bsd.cafe/tags/SAML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAML</span></a> <a href="https://mastodon.bsd.cafe/tags/FaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FaaS</span></a> <a href="https://mastodon.bsd.cafe/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> <a href="https://mastodon.bsd.cafe/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.bsd.cafe/tags/Go" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Go</span></a> <a href="https://mastodon.bsd.cafe/tags/ParchLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ParchLinux</span></a> <a href="https://mastodon.bsd.cafe/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://mastodon.bsd.cafe/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> <a href="https://mastodon.bsd.cafe/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a> <a href="https://mastodon.bsd.cafe/tags/Microservices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microservices</span></a> <a href="https://mastodon.bsd.cafe/tags/FileManager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FileManager</span></a> <a href="https://mastodon.bsd.cafe/tags/UFAAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UFAAS</span></a> <a href="https://mastodon.bsd.cafe/tags/TechDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechDevelopment</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
damienbod<p>Blogged: Use client assertions in OpenID Connect and ASP.NET Core</p><p><a href="https://damienbod.com/2025/02/24/use-client-assertions-in-openid-connect-and-asp-net-core/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/02/24/use-c</span><span class="invisible">lient-assertions-in-openid-connect-and-asp-net-core/</span></a></p><p><a href="https://mastodon.social/tags/aspnetcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspnetcore</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openidconnect</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.social/tags/net9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>net9</span></a> <a href="https://mastodon.social/tags/entraid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entraid</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
damienbod<p>Blogged: Customizing a single client sign-in using parameters in Duende IdentityServer</p><p><a href="https://damienbod.com/2025/02/17/customizing-a-single-client-sign-in-using-parameters-in-duende-identityserver/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/02/17/custo</span><span class="invisible">mizing-a-single-client-sign-in-using-parameters-in-duende-identityserver/</span></a></p><p><a href="https://mastodon.social/tags/aspnetcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspnetcore</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/identity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identity</span></a> <a href="https://mastodon.social/tags/duende" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>duende</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openidconnect</span></a></p>
damienbod<p>Blogged: ASP.NET Core delegated OAuth Token Exchange access token management</p><p><a href="https://damienbod.com/2025/02/10/asp-net-core-delegated-oauth-token-exchange-access-token-management/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/02/10/asp-n</span><span class="invisible">et-core-delegated-oauth-token-exchange-access-token-management/</span></a></p><p><a href="https://mastodon.social/tags/aspnetcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspnetcore</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/net9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>net9</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openidconnect</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/duende" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>duende</span></a> <a href="https://mastodon.social/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> <a href="https://mastodon.social/tags/identity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identity</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Aaron PareckiAt long last, the OAuth working group has finished the Best Current Practice for OAuth 2.0 Security and it was just published as RFC9700! This has been a long time in the works, and I'm very thankful to everyone who has helped out with it over the years! <br> <br><a href="https://www.rfc-editor.org/rfc/rfc9700.html" rel="nofollow noopener noreferrer" target="_blank"><span class="">https://</span>www.rfc-editor.org/rfc/rfc9700.html</a> <br> <br>This is one of the major inputs to OAuth 2.1, so I'm also very excited to be able to move that forward this year as well!
damienbod<p>Blogged: Multiple client sign-in customizations using Duende identity provider</p><p><a href="https://damienbod.com/2025/02/03/multiple-client-sign-in-customizations-using-duende-identity-provider/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/02/03/multi</span><span class="invisible">ple-client-sign-in-customizations-using-duende-identity-provider/</span></a></p><p><a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/aspnetcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspnetcore</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.social/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> <a href="https://mastodon.social/tags/identity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identity</span></a></p>
Francis Augusto 🇳🇴/🇧🇷/:bahia:<p>A little rant about e-mail authentication: </p><p><a href="https://francisaugusto.com/2025/Email-quo-vadis-or-where-is-oidc-for-everyone/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">francisaugusto.com/2025/Email-</span><span class="invisible">quo-vadis-or-where-is-oidc-for-everyone/</span></a></p><p><span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mwl</span></a></span> I'd love your comment on this!</p><p><a href="https://mastodon.babb.no/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://mastodon.babb.no/tags/oauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.babb.no/tags/oauth2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth2</span></a> <a href="https://mastodon.babb.no/tags/thunderbird" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thunderbird</span></a></p>

Langsam wird es auf meiner #GoToSocial Instanz gemütlich :neocat_comfy:.

Ich habe gerade eine Sammlung von #NeoCat :neocat: Emojis hochgeladen. Das war gar nicht so einfach, da GTS solch einen Sammel-Upload von #MissKey Emoji Archiven noch nicht unterstützt. Man kann Emojis nur einzeln per API Aufruf hochladen.

Da ich aber ein bisschen #Python kann, war das Problem relativ schnell behoben

**Ich habe zwei Scripte geschrieben:**

- Eines um mich per #OAuth zu authentifizieren um ein Bearer Token für die API Aufrufe zu erhalten.
- Ein weiteres, das die meta.json Datei von MissKey kompatiblem Emoji Archiven auswertet und dann alle Emojis im Archiv einzeln per API Aufruf hochlädt.

**Was habe ich gelernt:**

- Wie MissKey Emoji Archive aufgebaut sind.
- Wie man sich bei GTS per OAuth authentifiziert.
- Wie man Emojis aus MissKey Archiven per GTS API calls hochlädt.

#SelfHosting #GoToSocial #Python #OAuth #CustomEmojis

Okay, brain does not want to stop thinking about this:
Is it a good idea to built a self-hostable thing that supports the use of #OAuth authorisation servers as “identity providers”, i.e. you can sign up/in using e.g. your fedi account? Any examples come to mind?

Besides technical considerations (like #Mastodon’s non-spec app registration), of course the question of moving identities comes up and the obvious moderation topics (blocks, blocklists, …).