Trending Sources

When to Use Facebook Connect – Twitter Oauth – Google Friend Connect for Authentication?

SoCal CTO

One of the topics that came up in my post Mobile Internet Apple Facebook was around open vs. closed platforms. Example What do I mean? That’s it.

Oauth 32

Connect to Facebook, LinkedIn, Twitter, and G+

Feld Thoughts

I wonder if this will change with Office 365 – I hope Microsoft is building a trivial to use oauth to O365 so it’s easy to connect to, along with a good sync API. Tech I Use auth facebook g+ gmail google linkedin microsoft oauth twitterAnd, by using my Gmail as the starting point / authentication, they connected me to G+.

Oauth 46

How OAuth Works

Constantly Learning

OAuth is protocol for delegating authentication. Before OAuth, if Alice wanted to grant Bob access to her resources, Alice would have to give Bob her credentials, usually a username and password. OAuth allows this to happen without Alice having to share her secret information. OAuth solves this problem. How OAuth 1.0

API 0

Facebook Authentication and OAuth

Constantly Learning

We've already solved the account registration design pattern with OAuth. Rather than using OAuth to accessing resources we can use it for authenticating. Newer applications are starting to move to the OAuth Authentication design pattern to reduce signup friction. I love using new applications, new apps, and new services.

Understanding OAuth: An Overview

parand.com

startupcto

Oauth 0

How to Send Emails in WordPress with Gmail SMTP Server

Blogtrepreneur | Entrepreneur Blog

The first method uses a plugin called WP Mail SMTP while the second method is setting up Gmail SMTP using OAuth Protocol. consent screen.

Oauth 24

Hacker News launches API with near real-time access to site’s data

The Next Web

The API is read-only for now, but the YC-backed site could enable to private per-user info using OAuth in the future.

Oauth 24

Rethinking Mobile First

A VC : Venture Capital and Technology

Sign-up with OAuth is faster. I wrote the Mobile First Web Second blog post a few years ago. In that post, I talked about apps that were designed to be used on mobile primarily with the web as a companion. There have been a number of startups that have taken that approach and done well with it. But is it the right thing to do? Not at all.

Mobile 116

Registration Form Design with Facebook, Twitter, LinkedIn Authentication

SoCal CTO

That post looked at when and why you would use Facebook, Twitter, LinkedIn, etc. as part of your registration and authentication mechanism.

Design 102

Is LinkedIn Intro Good, Bad, or Impossible?

Feld Thoughts

And since it uses OAuth to log in, it doesn’t even need to ask for your credentials. When LinkedIn posted LinkedIn Intro: Doing the Impossible on iOS I was intrigued. The post title was provocative (presumably as intended) and drew a lot of attention from various people in the security world. Simple to configure and high leverage.

Oauth 98

32 Questions Developers May Have Forgot to Ask a Startup Founder

SoCal CTO

See also - When to Use Facebook Connect – Twitter Oauth – Google Friend Connect for Authentication. It needs to be a conversation. Partners?

What You Can Learn from a Scorpion

Both Sides of the Table

Being able to leverage mobile contacts on your phone gave them independence from Facebook while many other people were doing anything they could to oAuth in FB users. In a word – you are truly vulnerable. In politics this is often described as a Hobbesian system (after Thomas Hobbes who wrote Leviathon in 1651). You’re a scorpion!

Oauth 95

32 Questions Developers May Have Forgot to Ask a Startup Founder

SoCal CTO

See also - When to Use Facebook Connect – Twitter Oauth – Google Friend Connect for Authentication. It needs to be a conversation. Partners?

10 Questions Your API Documentation Must Answer

Launch Any

Effective communication is the most important factor for API success. Your API Documentation Must Answer 10 Key Questions.

API 43

One Simple Way to Generate More Traffic for Every Blog Post

Duct Tape Marketing

For last field Callback URL use native app default – urn:ietf:wg:oauth:2.0:oob It had a good run, so now on to the next one right?

Oauth 31

Top 120 Startup Posts for 2010

SoCal CTO

500 Hats , February 1, 2010 When to Use Facebook Connect – Twitter Oauth – Google Friend Connect for Authentication? Some really great stuff in 2010 that aims to help startups around product, technology, business models, etc. First Principles. Berkonomics , November 29, 2010 Rice Alliance IT/Web 2.0

CTO 80

Twitter hacked – reminder of connected Twitter apps

Eric Friedman

However during the process Twitter reminded me of all the other sites/apps/services I have OAuth’d with in the past few years. oops!).

How Online Video Companies Can Increase Margin and Build Better Businesses

Both Sides of the Table

This post looks at how the best in industry are moving well beyond the 16.5% margin range to more sustainable 50-60% margin businesses. But wait!

Startup CTO or Developer

SoCal CTO

I’ve been having discussions with several people recently about the role of the CTO (Chief Technology Officer) in very early stage companies.

CTO 87

The new “getting started” with gadgets

Eric Friedman

Now however, you are greeted with ever familiar OAuth prompts for services you probably already have an account with. Setting up a digital picture frame you are asked to OAuth with Flickr. This shows a world of interconnected devices, that starts with the initial OAuth handshake. Getting started with gadgets has changed.

Gluu integrates Toopher for 2FA

Austin Startup

and OpenID Connect, the soon-to-be standardized profile of OAuth 2.0. Gluu, an open source access management company, announced today that it has open-sourced the code needed to support Toopher, a location aware two-factor authentication mechanism, in its enterprise SSO and access management platform. Enterprise Toopher

Why and How You Should Write REST-Centric Applications

Web 2.0 Development and Business Lessons

Although it’s not without its share of problems, we chose OAuth 2.0 Since we’re using Dojo, we created a base class that provides the following helpers: Takes care of obtaining and managing OAuth refresh and access tokens by tracking token expire times and fetching new tokens when needed. What’s Public, What’s Private?

The Accidental API

Launch Any

How to mitigate this risk: Implement API security to restrict access to the API, using standards such as OAuth. Do you have a web or mobile API?

API 17

Introduction to Growth Hacking for Startups

VC Cafe

APIs – Integrating with Twitter, Facebook and Google+ is essential for more than just the Oauth login. like/+1/follow? Rinse and repeat.

API 62

Building Products for Mass Adoption

Both Sides of the Table

Here’s how we use oAuth to integrate the user’s social graph. They use products because the products solve a need they have.

Drop in some intelligent security to your startup with Castle.io

ArcticStartup

Their API works with both your home-grown login configuration or with outside tools like OAuth. Enter Malmö-based Castle.io is building.

The Psychology of Influence in Online Startups

VC Cafe

Today it’s relatively simple to find out a lot of information about the users by having them connect to one of their social profiles using OAuth.

Oauth 44

Getting Featured

David Lee

Facebook Open Graph and Twitter OAuth create immediate network effects but also make switching apps easier (i.e., Getting “featured” in the iTunes App Store or Google Play is a boon for any mobile app. It can lead to thousands or even millions of downloads in a matter of weeks. Therefore startups naturally covet this.

Oauth 10

Introducing Getsy, A Secure Command Line Interface to the Etsy API

Code as Craft

But since the OAuth protocol uses 3-legged authentication, and there are several tokens and other intricacies to handle, it makes curl very difficult to use directly. export OAUTH_CONSUMER_KEY='yourkey'. export OAUTH_CONSUMER_SECRET='yoursecret'. WWW::Getsy is a command line tool that does just that. chmod +x perlbrew. bashrc.

The Psychology of Influence in Online Startups

VC Cafe

Today it’s relatively simple to find out a lot of information about the users by having them connect to one of their social profiles using OAuth.

Oauth 28

Gluecon Is Less Than A Month Away (And Special 20% Bonus Code)

Feld Thoughts

Gluecon is now slightly less than a month away, and if you’re not going, you should. Gluecon is a phenomenal gathering of developers working in the big data, mobile, and cloud computing arenas (where the topic of the API comes up continually). And there’s a CloudCamp. Use “brad12″ to take 10% off of your gluecon registration.

6 Gadgets to Invent Now

Fresh Inc.: The Staff Blog

tech reviewer John Brandon sees the good, the bad, and the ugly gadgets of the world. But here are six things he'd really like to see.

Oauth 12

Graphs

Chris Dixon

Besides creating graphs, Facebook and Twitter (via Facebook Connect and OAuth) created identity systems that are extremely useful for the creation of 3rd party graphs. It has become customary to use “ graph &# to refer to the underlying data structures at social networks like Facebook. Edges are what mathematicians call relations.

API First Transformation at Etsy – Concurrency

Code as Craft

The user ID is determined via the user cookie or OAuth token, dependent on the Service, which we will talk about below. Finally, how did it end?

API 19

Experimenting with HHVM at Etsy

Code as Craft

We frequently encountered bugs and missing features in the MySQL, Memcached and OAuth extensions, among others. What is HHVM? Why HHVM? Release!

PHP 29

Tradeshift Opens Up Its Arms, Brings Its Apps To Developers

ArcticStartup

Better security, iframe sources are OAuth signed, thus ensuring the servers can identify each user with their Tradeshift identity. Tradeshift , the Danish firm that has been in reports quite often here at ArcticStartup is making itself more useful with the announcement of bringing their applications to developers.

Some things that make mobile user acquisition difficult

The Equity Kicker

Vibhu Norby, founder of YC backed Everyme and Origami has a good post up explaining why his company is pivoting from mobile-first to web-first. Mobil

Subscriptions are the New BLACK. (+ why Facebook, Google, & Apple.

500 Hats

My bigger concern is around Oauth and payment solutions. I recently wrote about this in my post: When to Use Facebook Connect – Twitter Oauth – Google Friend Connect for Authentication? Master of 500 Hats A blog about Geeks, Entrepreneurs, & Startups in Silicon Valley, by Dave McClure. The Internet Revolution, Act III. Part II! Hmmm.

#DefragCon 2013: Programming with Personal Clouds: A Post-Web Architecture — Phil Windley, Kynetx

Launch Any

OAuth access. Programming with Personal Clouds: A Post-Web Architecture – Phil Windley, Kynetx. Personal cloud made up of a constellation of persistent computational objects – picos. Picos have identity, storage, open-event network, processing, event channels, and APIs. Clouds should center around objects and people. Dropbox.

API 0

What The Rails Security Issue Means For Your Startup

www.kalzumeus.com

Alright, let’s move down the line: Look for anybody who implements OAuth/Facebook Connect/etc. Kalzumeus Software. Greatest Hits. About.