Protecting Internal Web Resources
BackgroundTL;DR: This blog post is a write-up of the process I went through to setup a set of internal web resources and apps for a small company I am running in my spare time ( providing a Single-Sign-On / SSO experience for internal users with web applications protected by flexible access policies including single and multi-factor authentication / two-factor authentication or 2FA).
As I mentioned in the TL;DR above, I run a small software/technology com … ⌘ Read more
@prologic_blog@feeds.twtxt.net So how does your idea stop spiders crawling data off the webpage, maybe even stealing content for another webpage auto creating device?
@off_grid_living@twtxt.net It’s essentially behind two forms of authentication. Yhere is no way to access the resources without a valid set of credentials and what’s called a TOTP setup by that user with a device.