ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,029 results

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

273,562 views

6 years ago

Microsoft Azure
Authentication fundamentals: Federation | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

6:19
Authentication fundamentals: Federation | Microsoft Entra ID

169,259 views

6 years ago

ByteByteGo
Session Vs JWT: The Differences You May Not Know!

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bytebytegoytTopic Animation ...

7:00
Session Vs JWT: The Differences You May Not Know!

613,184 views

1 year ago

Microsoft Azure
Authentication fundamentals: Web applications | Microsoft Entra ID

In this video series, Microsoft Entra ID Program Manager Stuart Kwan explains the fundamental workings of authentication using ...

6:02
Authentication fundamentals: Web applications | Microsoft Entra ID

144,343 views

6 years ago

IBM Technology
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

Get the threat intelligence guide → https://ibm.biz/BdmwNZ Learn about the technology → https://ibm.biz/BdmwNY Exploring the ...

7:39
Role-based access control (RBAC) vs. Attribute-based access control (ABAC)

144,291 views

1 year ago

Delba
Next.js Patterns: Authentication (Best Practices for Server Components, Actions, Middleware)

Best practices for authentication in Modern Next.js and React: Server Components, Server Actions, Middleware.

12:14
Next.js Patterns: Authentication (Best Practices for Server Components, Actions, Middleware)

243,074 views

1 year ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

332,124 views

8 years ago

Coding Droplets
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

Get Source Code by Supporting on Patreon: https://patreon.com/CodingDroplets Blazor Tutorial Series Playlist link: ...

14:25
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

84,128 views

2 years ago

Google Cloud Tech
Agent Sessions and Tool Authentication

Discover how to build AI agents that securely interact with user-specific data using Google's Agent Development Kit (ADK).

3:34
Agent Sessions and Tool Authentication

4,062 views

4 months ago

Cosden Solutions
Role-Based Authentication in React (Complete Tutorial)

Project React → https://cosden.solutions/project-react Import React (Newsletter) ...

26:31
Role-Based Authentication in React (Complete Tutorial)

74,740 views

1 year ago

Microsoft 365 Copilot (commercial)
Overview of multi factor authentication

Multi-factor authentication is an added step to the sign in process which improves your security by requiring you to use a separate ...

2:16
Overview of multi factor authentication

241,037 views

2 years ago

leerob
Next.js App Router Authentication (Sessions, Cookies, JWTs)

Learn the foundations of session based authentication through cookies in the Next.js App Router, and how community libraries ...

11:31
Next.js App Router Authentication (Sessions, Cookies, JWTs)

344,147 views

2 years ago

Microsoft Azure
Identity Architecture: PHS and PTA Authentication | Microsoft Entra ID

In this video, learn how to help customers get started with Password Hash Synchronization (PHS). PHS as a form of authentication ...

7:24
Identity Architecture: PHS and PTA Authentication | Microsoft Entra ID

12,733 views

6 years ago

Google Cloud Tech
Cloud Run user auth for internal apps

Enabling IAP for Cloud Run → https://goo.gle/43O59zz GitHub → https://goo.gle/3Ch8gUK In this video, Martin demonstrates how ...

15:31
Cloud Run user auth for internal apps

29,599 views

2 years ago

Anton Putra
Google Cloud Functions Tutorial: HTTP & API Gateway & Pub/Sub Triggers + Authentication & Serverless

Mentorship/On-the-Job Support/Consulting - https://calendly.com/antonputra/youtube or me@antonputra.com ...

26:35
Google Cloud Functions Tutorial: HTTP & API Gateway & Pub/Sub Triggers + Authentication & Serverless

94,986 views

4 years ago

Christos Matskas
Secure Serverless APIs with Python FastAPI, Azure AD and Azure Functions

Step by step video on how to create serverless APIs using Azure Functions with Python and Fast API. Secure your API with JWT ...

13:52
Secure Serverless APIs with Python FastAPI, Azure AD and Azure Functions

33,203 views

3 years ago

Whiteboard Security 🛡️
Authentication Methods In Cyber Security

Whether you're interested in the authentication method in general or want to understand the message authentication function in ...

3:32
Authentication Methods In Cyber Security

1,558 views

1 year ago

Cerbos
The differences between authentication and authorization

Authentication and authorization are two critical processes in software development that can help you ensure the security and ...

1:30
The differences between authentication and authorization

871 views

2 years ago

Cosden Solutions
The Only Authentication Tutorial You'll Ever Need (React + SuperTokens)

In this video, I build a complete authentication system with React and SuperTokens in just 40 minutes. No more weeks of JWT ...

44:20
The Only Authentication Tutorial You'll Ever Need (React + SuperTokens)

15,652 views

7 months ago

Brother Europe
Secure Function the What and the How

Secure Function the What and the How How secure function lock looks from a Brother device.

6:31
Secure Function the What and the How

131 views

1 year ago