Chocolatey Chat with Rob Reynolds + Okta DevRel
Video/Stream
Join the Okta DevRel team as we talk about what’s coming for Chocolatey on Windows, CI/CD, CLI …
Video/Stream
Join the Okta DevRel team as we talk about what’s coming for Chocolatey on Windows, CI/CD, CLI …
Video/Stream
Brian Demers and Micah Silverman teach Lee Brandt how to use the Okta CLI.
What is a JWT? How are they used? Find out in this post!
JSON Web Tokens (JWT) are used everywhere (even places they shouldn’t be). This post will cover the basics of what you need to know about JWT and the related specifications in the Javascript Object Signing and Encryption (JOSE) family.
Tutorial: Learn how to use JWT and opaque access with Spring Boot.
The topic of validating an OAuth 2.0 access tokens comes up frequently on this blog. Often we talk about how to validate JSON Web Token (JWT) based access tokens; however, this is NOT part of the OAuth 2.0 specification. JWTs are so commonly used that Spring Security supported them before adding support for remotely validating tokens (which is part of the OAuth 2.0 specification.)
In this post, you will build a simple application that takes advantage of both types of validation.
We ran Java performance tests on Arm and Intel, the results may surprise you!
Arm processors have been in the news lately, and it’s causing confusion and worries about processor performance for some folks. After Apple announced its plan to switch to Arm-based processors, I heard people (incorrectly!) speculating the performance would be similar to a Raspberry Pi. Java on Arm is nothing new, but we are seeing increased Arm investment from cloud vendors. Amazon recently updated its Arm offerings, and Microsoft is working on porting the JVM to Arm64 for Windows (no doubt for future Azure support).