“Hello World and Then Some” with Azure Active Directory B2C Custom Policies – Part 4: Hello! (But Only If You Have an Access Code)

This post continues a series that provides a walkthrough illustrating how to work with Azure Active Directory B2C custom policies by building one from the ground up. As the series progresses, the topics will serve to show how the different parts of the AAD B2C policy syntax and the underlying framework can be brought together…

OAuth 2.0 Part 2 – The Four Party Diagram

Understanding the Four Party Diagram In the last post, we made it through defining the four roles represented in the four party diagram. Now we’re going to dig into the arrows that represent information flowing between the parties. Authorization Request This is conceptually straightforward. The client needs to ask the resource owner for permission to…

Single Sign On with OAuth in Windows Store Apps

Various providers often provide documentation and even SDKs that make it easier to connect with and authenticate to their service. The problem is that most scenarios assume a web-based application or specific mobile clients. The process in general looks something like this: How can you take protocol modeled for the web and make it work…