today, i set up emacs gnus as mail client for my work email at microsoft outlook. an administrator of our microsoft-tenant had to approve my client-id and -secret beforehand.

- emacs mail reader: gnus (with some custom elisp)
- sasl plugin kdexoauth2 for cyrus sasl method
- pizauth as oauth2 daemon
- msmtp for smtp
- isync / mbsync for imap

my custom elisp code ensures that pizauth server is running; opens the approval-URL in my browser; and asks me if i have clicked the button in the browser, before it fetches the emails.

as a final step, i'm going to set up mu as gnus search backend. just like i do for my personal emails on my personal computer.

#emacs #gnus #mail #email #outlook #microsoft #oauth #oauth2 #mbsync #isync #msmtp

๐Ÿ“Š Pembaruan data analitik telah tersedia.

"How to Implement Google OAuth 2.0: A Comprehensive Guide"

๐Ÿ”— Akses repositori/dokumentasi: https://www.forumena.com/arbitrase-yurisdiksi-taktik-ghost-hq-di-geopolitik-bisnis/

#oauth2 #google #authentication

Arbitrase Yurisdiksi: Taktik 'Ghost-HQ' di Geopolitik Bisnis - Forum MENA | Tech & Digital Economy

Bedah tuntas strategi 'Legal Hack' 2026: Cara startup elit meretas batas negara demi efisiensi makroekonomi digital tanpa melanggar hukum.

Forum MENA | Tech & Digital Economy
Damit die MCP Server nicht einfach frei im Internet stehen, hab ich sie mittels #authentik mit einem #oauth2 Flow gesichert.

commands for kanidm + bookstack

kanidm create group bookstack_admin

kanidm system oauth2 create-claim-map bookstack bookstack_roles bookstack_admin admin

kanidm system oauth2 update-scope-map bookstack bookstack_users email groups openid profile bookstack_roles

kanidm group add-members bookstack_admin stelb

Environment for bookstack:
OIDC_USER_TO_GROUPS=true
OIDC_GROUPS_CLAIM=bookstack_roles
OIDC_REMOVE_FROM_GROUPS=true

#iam #idm #oauth2 #roles #claim-map #kanidm

I did this for bookstack with kanidm
Given the oauth2 app is 'bookstack':
map claims (roles in bookstack, say admin)
to scopes and groups in IAM, e.g. bookstack_roles and bookstack_admin

add the scope to the oauth2 application

assign users to these groups as needed.

configure app which scope to use for roles

#iam #idm #oauth2 #roles #claim-map #kanidm

Ok, first time I tried to use a custom scope to map oauth2 users to application specific roles.
Followed some sample and I just replaced names.
Working with one role.. adding another. Both roles not working anymore.
Reading more theory about scopes and claims did help to understand (oh well ๐Ÿ™ˆ)
It's actually not that complicated ๐Ÿค“
Both roles working now. Writing up some docs and adding another 2 roles is planned for tomorrow.
#oauth2 #idm #kanidm

Bearer tokens are reusable. Thatโ€™s the problem.

In Quarkus 3.32 you can now implement a custom DPoPNonceProvider and stop OAuth token replay attacks properly.

I built a full end-to-end example with:
- DPoP-bound tokens
- Nonce challenge-response
- Replay protection
- Keycloak Dev Services

Full walkthrough:
https://www.the-main-thread.com/p/quarkus-3-32-dpop-nonce-provider-java-replay-protection

#Quarkus #Java #OAuth2 #DPoP #APISecurity

Deep-dive into OAuth2's 'Implicit Grant' โ€” clear, concise, and perfect for devs and security buffs. Learn risks, use-cases, and modern best practices in Part 9 of Mateu's series. Watch and level up your auth knowledge! #OAuth2 #WebSecurity #APIs #Auth #ImplicitGrant #Cybersecurity #Programming #English
https://video.mateuaguilo.com/videos/watch/8500530c-2e98-4063-b21b-d7c5cf5bb170
9. Implicit Grant

PeerTube
๐Ÿšจ CVE-2026-32242: CRITICAL race condition in parse-server (>=9.0.0 <9.6.0-alpha.11, <8.6.37) lets OAuth2 tokens be validated against wrong provider configs. Patch to 9.6.0-alpha.11/8.6.37! https://radar.offseq.com/threat/cve-2026-32242-cwe-362-concurrent-execution-using--7a67bf5f #OffSeq #parseServer #OAuth2 #RaceCondition
Release v1.0 of the official MCP C# SDK - .NET Blog

Whatโ€™s new in the MCP C# SDK v1.0, including enhanced authorization, richer metadata, tool calling enhancements and long-running requests.

.NET Blog