Andrea Chiarelli (@andychiare) 's Twitter Profile
Andrea Chiarelli

@andychiare

Software Engineer and Technical Author i.e. Continuous Learner @auth0 by @okta | Microsoft MVP | Identity, .NET, API, Web, JavaScript, DevRel, DX

ID: 824509617355059200

linkhttps://andreachiarelli.it calendar_today26-01-2017 06:49:46

3,3K Tweet

770 Takipçi

426 Takip Edilen

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

With the upcoming C# extension members, you can make the code that handles user claims in your ASPNET Core applications more readable. Learn from Hossein Kohzadi medium.com/@kohzadi90/71a…

Auth0 (@auth0) 's Twitter Profile Photo

Join us on June 18 for #DevDay2025 — it’s all about securing AI agents and building identity-aware GenAI apps. 🤖 Auth for Agents 🔐 Identity, delegation, consent 🎤 Great speakers + demos 🎟 Save your seat --> developerday.com

Join us on June 18 for #DevDay2025 — it’s all about securing AI agents and building identity-aware GenAI apps.

 🤖 Auth for Agents
 🔐 Identity, delegation, consent
 🎤 Great speakers + demos
 
🎟 Save your seat --> developerday.com
Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

What Identity challenges you face as a developer in building B2B SaaS applications? In this article, I explore the fundamental challenges and how Auth0 can help you implement them: 🏘️ Multi-tenancy 🤵‍♂️ Customer Onboarding: 👥 User Onboarding Learn more👇 auth0.com/blog/b2b-saas-…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

Building B2B SaaS? Granular access control is a beast. Here’s how to tame it. 🔒 1️⃣ Stop permissions bleeding between customer orgs 2️⃣ Use RBAC in the context of a specific organization 3️⃣ Know when to level up to ABAC or ReBAC for complex cases Read on: auth0.com/blog/b2b-saas-…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

Shipping to enterprise? Your B2B SaaS auth needs to be rock-solid. 🔒 🔗 Integrate securely with enterprise SSO 👥 Empower clients with delegated administration 🛡️ Go beyond passwords with MFA & adaptive auth Meet the highest security standards 👇 auth0.com/blog/b2b-saas-…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

"Developer advocacy is the public support of developer needs in front of those who can fulfill them." 🧐 This is a succint definition of developer advocacy that I provide in the first chapter of my e-book "I Am a Developer Advocate". 📙 Learn more! ⬇️ leanpub.com/i-am-a-develop…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

For a dev advocate, the best content comes out of what I call the "Three Interests Principle": 🏢 The topics my company is interested in 👥 The topics that developers in a given community are interested in 🙋‍♂️ The topics I am interested in Learn more: leanpub.com/i-am-a-develop…

For a dev advocate, the best content comes out of what I call the "Three Interests Principle":

🏢 The topics my company is interested in
👥 The topics that developers in a given community are interested in
🙋‍♂️ The topics I am interested in

Learn more: leanpub.com/i-am-a-develop…
Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

What do computer science and philosophy have in common? Could the mushrooms I ate last weekend have caused these hallucinations? Maybe. Or maybe not. You tell me. #philosophy #computerscience theturingmachine.net/computer-scien…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

🔑 How are you using your access tokens? 🛡️ Is your application effectively protected? ✅ Are you applying the principle of least privilege? I wrote an article to help you with this! #oauth #scopes #access_token #token auth0.com/blog/oauth2-ac…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

As a developer advocate, maintain an active conversation with developers. A few suggestions: 📣 Use the most comfortable communication channels 🗣️ Use the channel with the most opportunities for a conversation 👋 Be available and responsive Learn more👇 leanpub.com/i-am-a-develop…

As a developer advocate, maintain an active conversation with developers. A few suggestions:

📣 Use the most comfortable communication channels
🗣️ Use the channel with the most opportunities for a conversation
👋 Be available and responsive

Learn more👇
leanpub.com/i-am-a-develop…
Auth0 (@auth0) 's Twitter Profile Photo

Access tokens are powerful - too powerful, if you don’t rein them in. Andrea Chiarelli explains how to keep those tokens on a tight leash using the Principle of Least Privilege. auth0.com/blog/oauth2-ac…

Access tokens are powerful - too powerful, if you don’t rein them in.

<a href="/andychiare/">Andrea Chiarelli</a> explains how to keep those tokens on a tight leash using the Principle of Least Privilege.

auth0.com/blog/oauth2-ac…
Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

As a developer advocate, sooner or later you will be asked: ❓How useful is your content to developers? ❓How useful is your feedback to the product? The Awareness-Engagement-Action framework can help you. Learn more with my e-book. It's free! ⏬ leanpub.com/i-am-a-develop…

Auth0 (@auth0) 's Twitter Profile Photo

📖 Full breakdown by Dev advocate Andrea Chiarelli: ✔️Every param, explained. ✔️Every flow, unpacked. ✔️OAuth 2.1-ready. auth0.com/blog/anatomy-o…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

Understanding the meaning of the parameters in an OAuth 2.0 or OIDC authorization request is useful when something goes wrong when integrating your application with an identity provider or authorization server. I explain the most common parameters here: auth0.com/blog/anatomy-o…

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

Unpopular opinion: You can't be a good developer advocate if you are not a developer. 🧐 This is the topic of chapter five of my e-book. Get it for free! ⏬ leanpub.com/i-am-a-develop… #developers #devrel #advocates

Andrea Chiarelli (@andychiare) 's Twitter Profile Photo

There are many myths and legends surrounding JSON Web Tokens, which, as is often the case, turn out to be false. In this article published on the Auth0 blog, I debunk five of the most common myths about JWTs auth0.com/blog/five-myth… #jwt #token #session #security

There are many myths and legends surrounding JSON Web Tokens, which, as is often the case, turn out to be false.
In this article published on the <a href="/auth0/">Auth0</a>  blog, I debunk five of the most common myths about JWTs

auth0.com/blog/five-myth…

#jwt #token #session #security