• Blog
  • Search results shown for:

"proto"

10 of 16 results

announcements

May 20, 2025 • 5 min read

Secure A2A Authentication with Auth0 and Google Cloud

Production-ready AI agents need to be secure, and auth is a big part of security. Auth0 is partnering with Google Cloud to help deliver secure authentication for the Agent2Agent (A2A) protocol.

Damian Schenkelman

announcements

May 20, 2025 • 6 min read

[Duplicate] Secure A2A authentication with Auth0 and Google Cloud

Auth0 and Google Cloud are partnering to secure AI agent communication with the new Agent2Agent (A2A) protocol, ensuring robust authentication for the next generation of AI interactions.

Damian Schenkelman

ai

Apr 7, 2025 • 15 min read

An Introduction to MCP and Authorization

Discover the Model Context Protocol (MCP) and its authorization mechanisms. Learn how to use API keys, OAuth 2.1 implementation, and best practices for secure LLM API connections.

Juan Cruz Martinez

identity & security

Dec 19, 2024 • 4 min read

What is Password Authentication Protocol?

A Beginner’s Guide to Understanding Password Authentication Protocol (PAP)

Haley Bourke

identity & security

Mar 7, 2023 • 12 min read

The TLS Handshake Explained

Transport Layer Security (TLS) is the cryptographic protocol behind pretty much any computer network used today: from web browsing to email, APIs, and VoIP. But how exactly does it work?

Arthur Bellore

developers

Feb 20, 2023 • 8 min read

Zen and the Art of Identity Management

Should developers know Identity protocols like OIDC and OAuth, or should they only rely on high-level abstractions like SDKs?

Andrea Chiarelli

developers

Jun 23, 2021 • 9 min read

Protocol Types in Python 3.8

A quick introduction to the new Protocol class in Python 3.8 and how it enables structural typing

Vincenzo Chianese

developers

Apr 19, 2021 • 3 min read

Identity, Unlocked... Explained: Season 2 Ep 7

Identity protocols for internet browsers with Sam Goto (Google Chrome) and George Fletcher (Verizon)

Vittorio Bertocci

developers

Mar 5, 2021 • 3 min read

Identity, Unlocked... Explained: Season 2, Ep 3

Continuous Access Evaluation Protocol (CAEP) with Tim Cappalli and Atul Tulshibagwale

Vittorio Bertocci

engineering

Jan 16, 2019 • 16 min read

Creating a Node gRPC Service Using Mali

Learn about the engineering principles, technology, and goals behind the gRPC system by setting up a service.

Tim Ferrell

Load more