Week 31, year 2022
- Diagramming to Communicate - I recently discussed my diagramming style with an author of a book in my signature series. The post Diagramming to Communicate appeared first on Kalele. [Kalele]
- Securing Web APIs with Azure AD: Authorizing Client Applications - In our last post, we chose the OAuth 2.0 Client Credentials grant scheme to authenticate our APIs and daemon applications: API and daemon application calling an internal API. [Jimmy Bogard]
- 21.10.7 Release Notes - We are pleased to announce the official release of EventStoreDB OSS & Commercial version 21.10.7 long-term support (LTS). [Event Store blog]
- Securing Web APIs with Azure AD: Building the Server - In the last couple of posts, we looked at authentication and authorization options and picked some strategies for each. With those pieces chosen, we can now set about building our server. [Jimmy Bogard]
- Straightforward Event Sourcing with TypeScript and NodeJS - In the last two articles, I explained how to organise your business logic effectively, showing how proper typing and composition can help to… [Event-Driven by Oskar Dudycz]
- Concerned about Serverless Lock-in? Consider Patterns! - Design patterns have helped us improve software design for decades. In the cloud, they can also reduce our switching cost. That's magic! [The Architect Elevator]
- Securing Web APIs with Azure AD: Building the Server - Posts in this series: A Case Study Designing Authentication Schemes Authorizing Client Applications Building the Server Enabling Local Development Connecting External Clients Connecting Azure Clients Full example In the last couple of posts, we looked at authentication and authorization options and picked some strategies for each. With those pieces chosen, [Jimmy Bogard]
- Securing Web APIs with Azure AD: Authorizing Client Applications - Posts in this series: A Case Study Designing Authentication Schemes Authorizing Client Applications Building the Server Enabling Local Development Connecting External Clients Connecting Azure Clients Full example In our last post, we chose the OAuth 2.0 Client Credentials grant scheme to authenticate our APIs and daemon applications: API and [Jimmy Bogard]