Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jared

๐Ÿ‘ค Speaker
5113 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It breaks the flow. It does break the flow just slightly, but it really breaks the flow if that email isn't delivered immediately and it's delayed two, three, five. Sometimes, you know, if things get circling up there in the ether and not landing 15 minutes, 30 minutes, now you're basically like, I can't sign into your website. We've had that issue over time for sure.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It breaks the flow. It does break the flow just slightly, but it really breaks the flow if that email isn't delivered immediately and it's delayed two, three, five. Sometimes, you know, if things get circling up there in the ether and not landing 15 minutes, 30 minutes, now you're basically like, I can't sign into your website. We've had that issue over time for sure.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

able to do that post that's exactly how i handled it as well i had specifically i think outlook certain versions of outlook or maybe live 365 it's a microsoft product well yeah we'll pre-click on links for you in order to do malware checks and blah blah blah and so they would use just the get request would use that one-time password and then you'd hit it yourself and it wouldn't work anymore because it's been used and i had enough people complain about that over the years i mean we've been it's been nine years

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

able to do that post that's exactly how i handled it as well i had specifically i think outlook certain versions of outlook or maybe live 365 it's a microsoft product well yeah we'll pre-click on links for you in order to do malware checks and blah blah blah and so they would use just the get request would use that one-time password and then you'd hit it yourself and it wouldn't work anymore because it's been used and i had enough people complain about that over the years i mean we've been it's been nine years

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So, you know, we don't have that many Outlook users, but enough where like, I don't want anybody to have a bad experience. And so every time I'm like, for a while, I was like, please don't use crap software. No offense. That didn't work. And then I'm like, well, you can't, you can only say that a couple of times. And then like the sixth, seventh time, I'm like, I gotta solve this problem.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So, you know, we don't have that many Outlook users, but enough where like, I don't want anybody to have a bad experience. And so every time I'm like, for a while, I was like, please don't use crap software. No offense. That didn't work. And then I'm like, well, you can't, you can only say that a couple of times. And then like the sixth, seventh time, I'm like, I gotta solve this problem.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It can't be that hard. And so it's like, well, I guess I just require JavaScript. You know, I just changed that to you land on the page and then the page itself does the post and that's what gets you in and that solved it. But again, one of those little wrinkles that you don't think about until it's deployed out there and people start to complain.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It can't be that hard. And so it's like, well, I guess I just require JavaScript. You know, I just changed that to you land on the page and then the page itself does the post and that's what gets you in and that solved it. But again, one of those little wrinkles that you don't think about until it's deployed out there and people start to complain.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Well, it's a one-time magic link. And so once it gets used, you don't want it to still work.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Well, it's a one-time magic link. And so once it gets used, you don't want it to still work.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, absolutely. It's just this balance between optimal security and usability, which is so hard to strike. And because everybody kind of wants to do it their own way. I mean, there's people who are like SSO for life, right? Like, just let me log in with my Google account. I'm actually the opposite. I don't want to use any of that junk.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Yeah, absolutely. It's just this balance between optimal security and usability, which is so hard to strike. And because everybody kind of wants to do it their own way. I mean, there's people who are like SSO for life, right? Like, just let me log in with my Google account. I'm actually the opposite. I don't want to use any of that junk.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Unless the service specifically connects to a thing. So like, if I'm going to use a piece of software that's going to use my GitHub account's information in order to augment my GitHub experience, fine. I'm happy to log in with my GitHub.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Unless the service specifically connects to a thing. So like, if I'm going to use a piece of software that's going to use my GitHub account's information in order to augment my GitHub experience, fine. I'm happy to log in with my GitHub.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's nice that it's there. Cause you can stop and decide versus it just going through for sure. But I agree. Like if you could have check boxes that you could uncheck, like, you know, yeah, not granular, not granular at all.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It's nice that it's there. Cause you can stop and decide versus it just going through for sure. But I agree. Like if you could have check boxes that you could uncheck, like, you know, yeah, not granular, not granular at all.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Right. And sometimes the other strategy I can, I can rationalize the other strategy, which is like, I don't know, let's just ask for as much as we, we might need it eventually anyways, just ask for more. And that way we don't have to come back and like re ask later if we decide we need this thing.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Right. And sometimes the other strategy I can, I can rationalize the other strategy, which is like, I don't know, let's just ask for as much as we, we might need it eventually anyways, just ask for more. And that way we don't have to come back and like re ask later if we decide we need this thing.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And so especially certain people who are like data miners are like, we may need, you know, the thing about just collect all the data we may need it in the future. That's easy to sell that in a meeting, I think. Totally. Yeah.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And so especially certain people who are like data miners are like, we may need, you know, the thing about just collect all the data we may need it in the future. That's easy to sell that in a meeting, I think. Totally. Yeah.