Chapter 13. Identity, Security, and Rights Management
It wasn’t like her to interject, but Danielle was sensing a trend forming and had been for almost a month. Throughout the summer, one by one, the developers were taking a week’s vacation to rest up and prepare for the official launch and the onboarding of the new software system. For two weeks in a row she’d overheard other team members talk about some of the security bits as they handed the work off prior to their departures, but she hadn’t thought about it until now.
“Okay, so that makes sense,” Marc said in response to Mark, “because I can just assign the claims I need as part of the middleware check-in at sign in. But how do I get Facebook authentication working locally?”
“Oh, that’s ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.