Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you think people misuse OIDC, just imagine how much they could fail implementing a AuthN/AuthZ on their own.


What about oidc and authn+z on their own? ;)

Failure galore




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: