Rezultati pretraživanja
  1. Osobe Vidi sve

  2. 4. velj

    This run-through of customer identity and access management (CIAM) will help you understand the basics in minutes. Learn more :

  3. [ 🌍] Today we want to show you the office and the incredible team we have in 🇱🇰. 👉Look at our pics! 📸

  4. prije 23 sata
  5. 5. velj
  6. 5. velj
  7. 4. velj
    Odgovor korisniku/ci

    En realidad es levantar un legacy core gigante 🦄 ahora agregaré al CV jajajaja

  8. 4. velj

    Creo que no logré destacar mi emoción al ver como el funcionaba 😝 las cagó como algo tan peluo que se resuelve te puede arreglar el día !!

  9. 3. velj

    " 3.0 is now merely a matter of running a kubectl command against the Kubernetes cluster and it will take care of the rest."

  10. 2. velj

    " Microgateway, which considers an open API definition as a single source of truth, can be used as an enforcement point for API ."

  11. 2. velj

    User-Managed Access 2.0 or UMA is a new federated authorization standard protocol built on top of OAuth 2.0 which enables party-to-party sharing. Find out more:

  12. 2. velj
  13. 1. velj

    I just published Building a digital health platform with open source software

  14. 31. sij
  15. 31. sij

    📝 [TUTORIAL] How to use JWT TOKENS to exchange data. 👉Learn with this tutorial here:

  16. 30. sij

    "By providing the open definition to the apictl (API Controller) toolkit, API to deploy an API microgateway with the required policy enforcement."

  17. 30. sij
  18. 30. sij

    📕[EBOOK]📕 CASO DE ÉXITO: La implantación de la arquitectura 👉

  19. 29. sij

    You may need to establish link between related digital identities. Read further in local account linking at:

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.