Let’s encrypt caveats

Following the instructions at https://certbot.eff.org/#ubuntuxenial-apache  didn’t do it for me.   With Apache, it’s always tricky.  I’m currently using a bitnami WordPress EC2 instance, so I had to figure out the certbot stuff. It was actually not that hard.  As with many command line tools, everything starts with reading the documentation 🙂 The certonly option does the trick!  Always. Read More …

Why you should never use OAuth2 for authentication purposes

What OAuth2 (RFC6749 at https://tools.ietf.org/html/rfc6749) tries to solve is delegated access control to a protected resource. Typically a user (the resource owner) gives consent so that a client can access a protected resource (a REST API endpoint for example). However, it is/was common to abuse the protocol and introduce special ‘scopes’ like ‘signin’ or ‘authn’ Read More …

Using ASP.NET based applications on AWS – part 2

Packaging the application is really not harder than calling : msbuild <pathtoprojectfile>  /t:Package /p:DeployIisAppPath=”Default Web Site” But there is more…   Through configuration files in a subdirectory .ebextensions (at the level of web.config) you can add multiple .config files (in yaml format) that let you do all kinds of stuff, from running scripts, simple commands to downloading Read More …