This blog was written by an independent guest blogger.
When we think of “authentication” for our applications, most of us think of user registration, a login form, and resetting passwords. Our concerns begin and end there. But as we dive deeper and our security and compliance requirements change…
Link: Authenticating legacy apps with a reverse proxy