Microsoft's OAuth2 Implimentation: Using Microsoft Graph API

Microsoft's OAuth2 Implimentation: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 Implementation: Using Microsoft Graph API

Microsoft's OAuth2 Implementation: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 implementation: Using Microsoft Graph API

Microsoft's OAuth2 implementation: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Understanding Microsoft's OAuth2 implementation - Part 3: Using Microsoft Graph API

Understanding Microsoft's OAuth2 implementation – Part 3: Using Microsoft Graph API

| | integrations, Use Cases
In this third and final part of the "Understanding Microsoft’s OAuth2 Implementation" series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If ...
Microsoft's OAuth2 Implimentation: Registering an App

Microsoft's OAuth2 Implimentation: Registering an App

| | integrations, Use Cases
In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I ...
Microsoft's OAuth2 Implementation: Registering an App

Microsoft's OAuth2 Implementation: Registering an App

| | integrations, Use Cases
In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I ...
Microsoft's OAuth2 implementation: Registering an app

Microsoft's OAuth2 implementation: Registering an app

| | integrations, Use Cases
In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I ...
Understanding Microsoft's OAuth2 implementation - Part 2: Registering an application

Understanding Microsoft's OAuth2 implementation – Part 2: Registering an application

| | integrations, Use Cases
In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I ...
Swimlane runner-up in Microsoft Graph Security Hackathon

Swimlane runner-up in Microsoft Graph Security Hackathon

| | integrations
Within a few weeks of starting at Swimlane, our CEO Cody Cornell mentioned the Microsoft Graph Security Hackathon—put on by the Microsoft Graph Security team and DevPost. After assembling a team and ...
Our Microsoft Graph Security Hackathon submission

Our Microsoft Graph Security Hackathon submission

| | integrations
Within a few weeks of starting at Swimlane, our CEO Cody Cornell mentioned the Microsoft Graph Security Hackathon—put on by the Microsoft Graph Security team and DevPost. After assembling a team and ...
Loading...