Ann: Launched Open Collective for Ruby OAuth gems (oauth, oauth2, & others)
I've been the primary maintainer of OAuth tools in Ruby since 2017. In this move toward supporting myself with open source work I need your help!
https://opencollective.com/ruby-oauth #Ruby #OAuth #Authorization #Security #OIDC
Rename `oauth-xx` org to `ruby-oauth`?
Intent of current name was to be a home for oauth tools across many languages, but it never materialized that way. The vestigial -xx is awkward for many reasons, and I think discoverability would improve with a ruby-* org name, and perhaps it could even bring in other oauth-related tools. I have a few thoughts about this, so
I'm very interested in others thoughts #Ruby #RubyFriends #OAuth #Authentication
I released version 0.3.0 of #Lokksmith (#OIDC client) which now supports #Android and #iOS via #ComposeMultiplatform!
New Release! MCP Servers with Oauth: A full introduction to MCP, from zero to deployment in one weekend by Zach Silveira #books #ebooks #oauth #technology
This book provides the fastest way to get up to speed using the latest Model Context Protocol authentication specification that was finalized in May 2025.
Find it on Leanpub!
Blogged: Experimental alternative flow for OAuth First-Party Applications
https://damienbod.com/2025/06/10/experimental-alternative-flow-for-oauth-first-party-applications/
Max Mitchell | I Read All Of Cloudflare's Claude-Generated Commits https://www.maxemitchell.com/writings/i-read-all-of-cloudflares-claude-generated-commits/
#Hollo 0.6.0 is coming soon!
We're putting the finishing touches on our biggest security and feature update yet. Here's what's coming:
New features
Important notes for update
SECRET_KEY
requirements (44+ chars)Special thanks to @thisismissem for the extensive OAuth improvements that help keep the #fediverse secure and compatible!
Full changelog and upgrade guide coming with the release.
Blogged: Handling OpenID Connect error events in ASP.NET Core
https://damienbod.com/2025/06/02/handling-openid-connect-error-events-in-asp-net-core/
I'm not easily swearing, but how can I put this: sending infra emails from a data center to addresses managed by #Microsoft 365 is crazy. MS dislikes #SMTP AUTH, ok, and so begins the #OAuth journey to get the #postfix mail relay to embrace OAuth
The best idea so far is to write a script that acts as a proxy between postfix and MS, sending emails via the MS #GraphAPI. Undoubtedly much more secure and, just as undoubtedly, absolutely no vendor lock-in for something as simple as SMTP ... WTF!!