際際滷shows by User: ShiuFunPoon / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ShiuFunPoon / Wed, 21 Jul 2021 22:00:53 GMT 際際滷Share feed for 際際滷shows by User: ShiuFunPoon APIConnect Security Best Practice /slideshow/apiconnect-security-best-practice/249825474 securitybestpractice-v2-210721220053
This covers security with APIc/gateway. It goes over high-level concepts and what IBM APIc can offer, this covers 2018, and v10 of the product Note: this is from a presentation from a year or so ago, with some updates to the link]]>

This covers security with APIc/gateway. It goes over high-level concepts and what IBM APIc can offer, this covers 2018, and v10 of the product Note: this is from a presentation from a year or so ago, with some updates to the link]]>
Wed, 21 Jul 2021 22:00:53 GMT /slideshow/apiconnect-security-best-practice/249825474 ShiuFunPoon@slideshare.net(ShiuFunPoon) APIConnect Security Best Practice ShiuFunPoon This covers security with APIc/gateway. It goes over high-level concepts and what IBM APIc can offer, this covers 2018, and v10 of the product Note: this is from a presentation from a year or so ago, with some updates to the link <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitybestpractice-v2-210721220053-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This covers security with APIc/gateway. It goes over high-level concepts and what IBM APIc can offer, this covers 2018, and v10 of the product Note: this is from a presentation from a year or so ago, with some updates to the link
APIConnect Security Best Practice from Shiu-Fun Poon
]]>
925 0 https://cdn.slidesharecdn.com/ss_thumbnails/securitybestpractice-v2-210721220053-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GraphQL Security /slideshow/graphql-security-249810677/249810677 graphqlsecurity-210720234720
GraphQL is widely adapted. As it becomes more popular, there are security considerations for hosting GraphQL services. In this, I cover a set of good practices and ideas that can be used to protect this exciting technology]]>

GraphQL is widely adapted. As it becomes more popular, there are security considerations for hosting GraphQL services. In this, I cover a set of good practices and ideas that can be used to protect this exciting technology]]>
Tue, 20 Jul 2021 23:47:19 GMT /slideshow/graphql-security-249810677/249810677 ShiuFunPoon@slideshare.net(ShiuFunPoon) GraphQL Security ShiuFunPoon GraphQL is widely adapted. As it becomes more popular, there are security considerations for hosting GraphQL services. In this, I cover a set of good practices and ideas that can be used to protect this exciting technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/graphqlsecurity-210720234720-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> GraphQL is widely adapted. As it becomes more popular, there are security considerations for hosting GraphQL services. In this, I cover a set of good practices and ideas that can be used to protect this exciting technology
GraphQL Security from Shiu-Fun Poon
]]>
292 0 https://cdn.slidesharecdn.com/ss_thumbnails/graphqlsecurity-210720234720-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IBM APIc API security protection mechanism /slideshow/ibm-apic-api-security-protection-mechanism/246758337 apisecurityprotection-210422152322
What are the listed protection methods that are available to our customers]]>

What are the listed protection methods that are available to our customers]]>
Thu, 22 Apr 2021 15:23:21 GMT /slideshow/ibm-apic-api-security-protection-mechanism/246758337 ShiuFunPoon@slideshare.net(ShiuFunPoon) IBM APIc API security protection mechanism ShiuFunPoon What are the listed protection methods that are available to our customers <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/apisecurityprotection-210422152322-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What are the listed protection methods that are available to our customers
IBM APIc API security protection mechanism from Shiu-Fun Poon
]]>
188 0 https://cdn.slidesharecdn.com/ss_thumbnails/apisecurityprotection-210422152322-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to create a User Defined Policy with IBM APIc (v10) /slideshow/how-to-create-a-user-defined-policy-with-ibm-apic-v10-245749312/245749312 userpolicy-210406010308
IBM APIc ships a set of policy. However you can extend those capabilities by creating your own policy. This gives step by step on how that can be done, it also provides a template to help you jump start the process.]]>

IBM APIc ships a set of policy. However you can extend those capabilities by creating your own policy. This gives step by step on how that can be done, it also provides a template to help you jump start the process.]]>
Tue, 06 Apr 2021 01:03:07 GMT /slideshow/how-to-create-a-user-defined-policy-with-ibm-apic-v10-245749312/245749312 ShiuFunPoon@slideshare.net(ShiuFunPoon) How to create a User Defined Policy with IBM APIc (v10) ShiuFunPoon IBM APIc ships a set of policy. However you can extend those capabilities by creating your own policy. This gives step by step on how that can be done, it also provides a template to help you jump start the process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/userpolicy-210406010308-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IBM APIc ships a set of policy. However you can extend those capabilities by creating your own policy. This gives step by step on how that can be done, it also provides a template to help you jump start the process.
How to create a User Defined Policy with IBM APIc (v10) from Shiu-Fun Poon
]]>
1106 0 https://cdn.slidesharecdn.com/ss_thumbnails/userpolicy-210406010308-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cheatsheet to run DP docker /slideshow/cheatsheet-to-run-dp-docker/244613540 dpasdocker-210317192032
Quick cheatsheet on using DP as docker for development]]>

Quick cheatsheet on using DP as docker for development]]>
Wed, 17 Mar 2021 19:20:32 GMT /slideshow/cheatsheet-to-run-dp-docker/244613540 ShiuFunPoon@slideshare.net(ShiuFunPoon) Cheatsheet to run DP docker ShiuFunPoon Quick cheatsheet on using DP as docker for development <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dpasdocker-210317192032-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Quick cheatsheet on using DP as docker for development
Cheatsheet to run DP docker from Shiu-Fun Poon
]]>
139 0 https://cdn.slidesharecdn.com/ss_thumbnails/dpasdocker-210317192032-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to migrate an application in IBM APIc, and preserve its client credential /slideshow/how-to-migrate-an-application-in-ibm-apic-and-preserve-its-client-credential/243664195 ibmapicmigrateapp-210302043248
This provides the rest and toolkit command on how to migrate an application from one environment to another without know the client_secret in the plaintext format.]]>

This provides the rest and toolkit command on how to migrate an application from one environment to another without know the client_secret in the plaintext format.]]>
Tue, 02 Mar 2021 04:32:47 GMT /slideshow/how-to-migrate-an-application-in-ibm-apic-and-preserve-its-client-credential/243664195 ShiuFunPoon@slideshare.net(ShiuFunPoon) How to migrate an application in IBM APIc, and preserve its client credential ShiuFunPoon This provides the rest and toolkit command on how to migrate an application from one environment to another without know the client_secret in the plaintext format. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ibmapicmigrateapp-210302043248-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This provides the rest and toolkit command on how to migrate an application from one environment to another without know the client_secret in the plaintext format.
How to migrate an application in IBM APIc, and preserve its client credential from Shiu-Fun Poon
]]>
705 0 https://cdn.slidesharecdn.com/ss_thumbnails/ibmapicmigrateapp-210302043248-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DataPower as PCI /ShiuFunPoon/datapower-as-pci pci-210224225543
How does DataPower contribute to PCI]]>

How does DataPower contribute to PCI]]>
Wed, 24 Feb 2021 22:55:43 GMT /ShiuFunPoon/datapower-as-pci ShiuFunPoon@slideshare.net(ShiuFunPoon) DataPower as PCI ShiuFunPoon How does DataPower contribute to PCI <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pci-210224225543-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How does DataPower contribute to PCI
DataPower as PCI from Shiu-Fun Poon
]]>
66 0 https://cdn.slidesharecdn.com/ss_thumbnails/pci-210224225543-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to integration with 3rd Party OAuth Provider with IBM APIc /slideshow/how-to-integration-with-3rd-party-oauth-provider-with-ibm-apic/242699210 3rdpartyintegration-210213222638
This provides a high level on how to integrate with a 3rd party OAuth provider using IBM APIc]]>

This provides a high level on how to integrate with a 3rd party OAuth provider using IBM APIc]]>
Sat, 13 Feb 2021 22:26:37 GMT /slideshow/how-to-integration-with-3rd-party-oauth-provider-with-ibm-apic/242699210 ShiuFunPoon@slideshare.net(ShiuFunPoon) How to integration with 3rd Party OAuth Provider with IBM APIc ShiuFunPoon This provides a high level on how to integrate with a 3rd party OAuth provider using IBM APIc <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/3rdpartyintegration-210213222638-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This provides a high level on how to integrate with a 3rd party OAuth provider using IBM APIc
How to integration with 3rd Party OAuth Provider with IBM APIc from Shiu-Fun Poon
]]>
101 0 https://cdn.slidesharecdn.com/ss_thumbnails/3rdpartyintegration-210213222638-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to integration DataPower with Zos /slideshow/how-to-integration-datapower-with-zos/236218086 dp-zos-integration-200625192906
How to integrate DataPower with ZOS]]>

How to integrate DataPower with ZOS]]>
Thu, 25 Jun 2020 19:29:06 GMT /slideshow/how-to-integration-datapower-with-zos/236218086 ShiuFunPoon@slideshare.net(ShiuFunPoon) How to integration DataPower with Zos ShiuFunPoon How to integrate DataPower with ZOS <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dp-zos-integration-200625192906-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to integrate DataPower with ZOS
How to integration DataPower with Zos from Shiu-Fun Poon
]]>
264 0 https://cdn.slidesharecdn.com/ss_thumbnails/dp-zos-integration-200625192906-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DataPower Security Hardening /slideshow/datapower-security-hardening/232977422 dp-security-hardening-200501033113
This covers steps you can take to protect DataPower, or the services that is hosted on DataPower. ]]>

This covers steps you can take to protect DataPower, or the services that is hosted on DataPower. ]]>
Fri, 01 May 2020 03:31:12 GMT /slideshow/datapower-security-hardening/232977422 ShiuFunPoon@slideshare.net(ShiuFunPoon) DataPower Security Hardening ShiuFunPoon This covers steps you can take to protect DataPower, or the services that is hosted on DataPower. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dp-security-hardening-200501033113-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This covers steps you can take to protect DataPower, or the services that is hosted on DataPower.
DataPower Security Hardening from Shiu-Fun Poon
]]>
692 0 https://cdn.slidesharecdn.com/ss_thumbnails/dp-security-hardening-200501033113-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IBM Apic toolkit cheatsheet /slideshow/ibm-apic-toolkit-cheatsheet/227551925 apictoolkit-200210193029
cheatsheet on how to quickly get yourself familiar with the toolkit]]>

cheatsheet on how to quickly get yourself familiar with the toolkit]]>
Mon, 10 Feb 2020 19:30:29 GMT /slideshow/ibm-apic-toolkit-cheatsheet/227551925 ShiuFunPoon@slideshare.net(ShiuFunPoon) IBM Apic toolkit cheatsheet ShiuFunPoon cheatsheet on how to quickly get yourself familiar with the toolkit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/apictoolkit-200210193029-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> cheatsheet on how to quickly get yourself familiar with the toolkit
IBM Apic toolkit cheatsheet from Shiu-Fun Poon
]]>
196 0 https://cdn.slidesharecdn.com/ss_thumbnails/apictoolkit-200210193029-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DataPower DoS/DDoS /slideshow/datapower-dosddos/220622450 dosdp-200115225455
DataPower can help protect against DoS/DDoS. This was created a while back, content is still valid for the DP. Update a little to call out some newer features.]]>

DataPower can help protect against DoS/DDoS. This was created a while back, content is still valid for the DP. Update a little to call out some newer features.]]>
Wed, 15 Jan 2020 22:54:55 GMT /slideshow/datapower-dosddos/220622450 ShiuFunPoon@slideshare.net(ShiuFunPoon) DataPower DoS/DDoS ShiuFunPoon DataPower can help protect against DoS/DDoS. This was created a while back, content is still valid for the DP. Update a little to call out some newer features. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dosdp-200115225455-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DataPower can help protect against DoS/DDoS. This was created a while back, content is still valid for the DP. Update a little to call out some newer features.
DataPower DoS/DDoS from Shiu-Fun Poon
]]>
222 0 https://cdn.slidesharecdn.com/ss_thumbnails/dosdp-200115225455-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Login (Nested OAuth/OIDC) /slideshow/social-login-nested-oauthoidc/174245852 sociallogin-190920164458
Web sequence diagram explains how the protocol works]]>

Web sequence diagram explains how the protocol works]]>
Fri, 20 Sep 2019 16:44:58 GMT /slideshow/social-login-nested-oauthoidc/174245852 ShiuFunPoon@slideshare.net(ShiuFunPoon) Social Login (Nested OAuth/OIDC) ShiuFunPoon Web sequence diagram explains how the protocol works <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sociallogin-190920164458-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web sequence diagram explains how the protocol works
Social Login (Nested OAuth/OIDC) from Shiu-Fun Poon
]]>
324 1 https://cdn.slidesharecdn.com/ss_thumbnails/sociallogin-190920164458-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
White vs Black list /slideshow/white-vs-black-list/148167792 whiteandblacklist-190529174030
This covers the discussions that I have with my teams and customers. Whenever someone states one is better over the others always make me concern. As there are pros and cons to each solutions. And depends on the circumstance and constraints that the solution needs to address, sometimes a combination of both solutions would work best. This deck breaks down how I see this problem space, and based on the experiences on having to implement both solutions with OAuth/OIDC/SAML/payload filter and varies discussions with customers/collegeas/experts.]]>

This covers the discussions that I have with my teams and customers. Whenever someone states one is better over the others always make me concern. As there are pros and cons to each solutions. And depends on the circumstance and constraints that the solution needs to address, sometimes a combination of both solutions would work best. This deck breaks down how I see this problem space, and based on the experiences on having to implement both solutions with OAuth/OIDC/SAML/payload filter and varies discussions with customers/collegeas/experts.]]>
Wed, 29 May 2019 17:40:29 GMT /slideshow/white-vs-black-list/148167792 ShiuFunPoon@slideshare.net(ShiuFunPoon) White vs Black list ShiuFunPoon This covers the discussions that I have with my teams and customers. Whenever someone states one is better over the others always make me concern. As there are pros and cons to each solutions. And depends on the circumstance and constraints that the solution needs to address, sometimes a combination of both solutions would work best. This deck breaks down how I see this problem space, and based on the experiences on having to implement both solutions with OAuth/OIDC/SAML/payload filter and varies discussions with customers/collegeas/experts. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whiteandblacklist-190529174030-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This covers the discussions that I have with my teams and customers. Whenever someone states one is better over the others always make me concern. As there are pros and cons to each solutions. And depends on the circumstance and constraints that the solution needs to address, sometimes a combination of both solutions would work best. This deck breaks down how I see this problem space, and based on the experiences on having to implement both solutions with OAuth/OIDC/SAML/payload filter and varies discussions with customers/collegeas/experts.
White vs Black list from Shiu-Fun Poon
]]>
147 1 https://cdn.slidesharecdn.com/ss_thumbnails/whiteandblacklist-190529174030-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
APIC/DataPower security /slideshow/apicdatapower-security/143656480 10securitybestpractice-190504160329
This is covered during the tech conference. It covers high-level security. The best practice for deployment for gateway (what was known as last-mile) is covered at the end.]]>

This is covered during the tech conference. It covers high-level security. The best practice for deployment for gateway (what was known as last-mile) is covered at the end.]]>
Sat, 04 May 2019 16:03:29 GMT /slideshow/apicdatapower-security/143656480 ShiuFunPoon@slideshare.net(ShiuFunPoon) APIC/DataPower security ShiuFunPoon This is covered during the tech conference. It covers high-level security. The best practice for deployment for gateway (what was known as last-mile) is covered at the end. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/10securitybestpractice-190504160329-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is covered during the tech conference. It covers high-level security. The best practice for deployment for gateway (what was known as last-mile) is covered at the end.
APIC/DataPower security from Shiu-Fun Poon
]]>
1913 6 https://cdn.slidesharecdn.com/ss_thumbnails/10securitybestpractice-190504160329-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Open Banking via APIc 2018 /slideshow/open-banking-via-apic-2018/132431300 openbankingviaibmapiconnect0212-190219174442
We cover Open Banking regulation, and how IBM APIC 2018 can provide the solution for it.]]>

We cover Open Banking regulation, and how IBM APIC 2018 can provide the solution for it.]]>
Tue, 19 Feb 2019 17:44:42 GMT /slideshow/open-banking-via-apic-2018/132431300 ShiuFunPoon@slideshare.net(ShiuFunPoon) Open Banking via APIc 2018 ShiuFunPoon We cover Open Banking regulation, and how IBM APIC 2018 can provide the solution for it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/openbankingviaibmapiconnect0212-190219174442-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We cover Open Banking regulation, and how IBM APIC 2018 can provide the solution for it.
Open Banking via APIc 2018 from Shiu-Fun Poon
]]>
310 1 https://cdn.slidesharecdn.com/ss_thumbnails/openbankingviaibmapiconnect0212-190219174442-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Gateway/APIC security /slideshow/security0214/131987773 security0214-190216013758
In this deck, I cover all the new exciting security feature we have in both gateway and APIC. We are excited about the new features, and how they can be used to help protect the customer's deployment environment. ]]>

In this deck, I cover all the new exciting security feature we have in both gateway and APIC. We are excited about the new features, and how they can be used to help protect the customer's deployment environment. ]]>
Sat, 16 Feb 2019 01:37:58 GMT /slideshow/security0214/131987773 ShiuFunPoon@slideshare.net(ShiuFunPoon) Gateway/APIC security ShiuFunPoon In this deck, I cover all the new exciting security feature we have in both gateway and APIC. We are excited about the new features, and how they can be used to help protect the customer's deployment environment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/security0214-190216013758-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this deck, I cover all the new exciting security feature we have in both gateway and APIC. We are excited about the new features, and how they can be used to help protect the customer&#39;s deployment environment.
Gateway/APIC security from Shiu-Fun Poon
]]>
2028 3 https://cdn.slidesharecdn.com/ss_thumbnails/security0214-190216013758-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Gateway deepdive /slideshow/gateway-deepdive/131947117 gatewaydeepdive-190215174711
New IBM API Gateway - deep dive ]]>

New IBM API Gateway - deep dive ]]>
Fri, 15 Feb 2019 17:47:10 GMT /slideshow/gateway-deepdive/131947117 ShiuFunPoon@slideshare.net(ShiuFunPoon) Gateway deepdive ShiuFunPoon New IBM API Gateway - deep dive <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gatewaydeepdive-190215174711-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> New IBM API Gateway - deep dive
Gateway deepdive from Shiu-Fun Poon
]]>
594 1 https://cdn.slidesharecdn.com/ss_thumbnails/gatewaydeepdive-190215174711-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Token, token... From SAML to OIDC /slideshow/token-token-from-saml-to-oidc/65257323 tokenbased-160823021022
A overview of SAML, OAuth 2.0, OIDC, and JWT. What are they, and what to watch out for.]]>

A overview of SAML, OAuth 2.0, OIDC, and JWT. What are they, and what to watch out for.]]>
Tue, 23 Aug 2016 02:10:22 GMT /slideshow/token-token-from-saml-to-oidc/65257323 ShiuFunPoon@slideshare.net(ShiuFunPoon) Token, token... From SAML to OIDC ShiuFunPoon A overview of SAML, OAuth 2.0, OIDC, and JWT. What are they, and what to watch out for. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tokenbased-160823021022-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A overview of SAML, OAuth 2.0, OIDC, and JWT. What are they, and what to watch out for.
Token, token... From SAML to OIDC from Shiu-Fun Poon
]]>
1886 2 https://cdn.slidesharecdn.com/ss_thumbnails/tokenbased-160823021022-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OAuth 2.0 with IBM WebSphere DataPower /slideshow/data-power-oauth-34275528/34275528 datapower-oauth-140504224020-phpapp02
Quick summary of the OAuth support provided by IBM WebSphere DataPoewr]]>

Quick summary of the OAuth support provided by IBM WebSphere DataPoewr]]>
Sun, 04 May 2014 22:40:20 GMT /slideshow/data-power-oauth-34275528/34275528 ShiuFunPoon@slideshare.net(ShiuFunPoon) OAuth 2.0 with IBM WebSphere DataPower ShiuFunPoon Quick summary of the OAuth support provided by IBM WebSphere DataPoewr <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datapower-oauth-140504224020-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Quick summary of the OAuth support provided by IBM WebSphere DataPoewr
OAuth 2.0 with IBM WebSphere DataPower from Shiu-Fun Poon
]]>
7023 4 https://cdn.slidesharecdn.com/ss_thumbnails/datapower-oauth-140504224020-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ShiuFunPoon-48x48.jpg?cb=1688045987 nerd, coder, designer, architect. Only by doing the work, one knows how things work. https://cdn.slidesharecdn.com/ss_thumbnails/securitybestpractice-v2-210721220053-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/apiconnect-security-best-practice/249825474 APIConnect Security Be... https://cdn.slidesharecdn.com/ss_thumbnails/graphqlsecurity-210720234720-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/graphql-security-249810677/249810677 GraphQL Security https://cdn.slidesharecdn.com/ss_thumbnails/apisecurityprotection-210422152322-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ibm-apic-api-security-protection-mechanism/246758337 IBM APIc API security ...