Follow

Author: Admin

User Authentication and Authorization – Part ll

Posted on June 16, 2017 by in Node.Js

Introduction

Authentication is used by the server when it needs to know the identity of someone who is accessing their information.
Authorization is a process by which the server determines if the client has permission to use a resource or
access a file. In general, authentication answers the question“Who are you?” and authorization answers  “What are you allowed to do?”.

In an earlier blog, we have discussed about Token based authentication and authorization and how it is being implemented in one of our projects. Over these past few months, we’ve made changes to our approach.
Read on to find out what enhancements we have made and why.

Tools used for implementation

JWT

JSON Web Token (JWT) is a means of representing a signed content using JSON data structures (generally called as claims). You can find more information about JWT here.

REDIS

Redis is a data structure server and acts as “NoSQL” key value cache data store. You can find more information about Redis here.

Tips to sail through App Store review process

Posted on June 9, 2017 by in iOS

Introduction

We all might have gone through a situation at some point in Apple’s review process, where our app consistently gets rejected. You would have also thought that it is difficult to get approval for new apps. But it is very simple to get the approval if we abide by the review guidelines.
We have been in your shoes with the review process. With the experience we’ve gained over time on Apple’s review process, we’ve cracked the key to get an app reviewed and approved for listing in the Apple App Store. Compiled are the list of things you can do to reduce the review time, which have helped us immensely for the successful approval of our apps in a single go.

Good news is that Apple has reduced review process time. Usually the review time varies from app to app. On an average, 50% of the apps are reviewed in 24 hours and over 90% are reviewed in 48 hours.

“A shorter approval cycle” lets the developers to properly plan their app’s release.

Field Security behaviour in calculated fields

Posted on May 29, 2017 by in CRM Solutions

Introduction

Field level security in Microsoft Dynamics 365/CRM restricts access to the fields containing sensitive business data which are only accessible by authorized users.
It also serves as a means of adding an extra security around the field i.e Create, Update and Read value.