How to

How to configure the OAuth2Client to test against Safewhere*Identify OAuth2 Protocol Connection

Identify Configuration Create an OAuth2 Protocol connection with below configurations:  Add some scopes which will be requested from OAuth2Client (specified in OAuth2Client web.config key=”Scope”) Client ID: the unique ID across OAuth2 Protocol Connections Client secret: the secret code Redirect url: […]

Hosted forms

What is hosted form Hosted form is a customized html page of Identify Runtime to allow a user to edit html, binding, CSS and JavaScript of that page using REST API or Safewhere Admin and its content is stored in the SharedConfigurationSettings table. Because of security issue, the hardest part of hosted form […]

Account Lockout

Introduction Account lockout is a new feature of Safewhere Identify, starting from version 5.5, to defend against brute-force attack. According to OWASP: A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a […]

Reduce Safewhere Identify’s start-up time

Safewhere Identify is a big product with huge amount of features which also means that it has plenty of things to do during start up time. However, in reality our customers love not only features but also request for speed. […]

Microsoft Office 365 integration

Safewhere Identify is fully qualified to work with Microsoft Office 365 from version 5.1++. Please refer this documentation: here

HTTP Security Headers

Introduction Safewhere Identify now has support for a set of HTTP response security headers that per OWASP: “your application can use to increase the security of your application. Once set, these HTTP response headers can restrict modern browsers from running into easily preventable vulnerabilities.” […]

Safewhere UserMigrator – Identify – AzureAD

Introduction The User Migrator Identify – Azure AD application is an application that makes the export and import of users from Identify user store to Azure AD easier. The User Migrator is meant as an administrator tool – and should […]

Breach notification: export Identify data

Introduction  When a data breach happens, we need to notify all affected users about the breach. The approach is that we can write a script to extract email addresses from Identify database to a CSV data file by using the […]

Safewhere Identify data encryption

Data encryption  Safewhere Identify stores its main data in either Azure SQL or SQL Server databases and this document will show you how to do encryption for its data.  There are usually two main layers of encryption: encryption at the database level (also called encryption at rest) and encryption at the application […]

OAuth 2.0 samples

New samples  AspnetWebMvc   This is a web application using ASP.NET MVC framework. In this sample, it shows how to execute OAuth 2.0 requests using code flow, implicit flow and hybrid flow.   Link: https://github.com/Safewhere/OIDC/blob/master/src/CSharp/AspnetWebMvc   NancyOwinClient  This is a web application using Nancy framework. […]