Archiv.

OAuth 2.0 for Browser-Based Applications

OAuth 2.0 for Browser-Based Applications

How can OAuth 2.0 be implemented securely in web applications? This article explains why BFF is more secure than storing tokens in the browser — and when TMB still has its place.

read more
Orchitech is Moving

Orchitech is Moving

After eleven years enjoying the beautiful views from our offices atop Žižkov, it’s time for us to move out…

read more
Orchitech celebrates 16 years

Orchitech celebrates 16 years

🎉 Celebrating a Milestone! Orchitech has just turned sweet sixteen! We may still be on the journey toward maturity, but these past years have been an incredibly rewarding ride, filled with growth and innovation. Over this time, we’ve established ourselves as...

read more
The fourth Devops course completed

The fourth Devops course completed

For the fourth time, the autumn Monday evenings in our company were enriched by common moments with participants from Czechitas. We met at the DevOps course that we run every year. "Over the last ten weeks I have once again had the privilege of leading this exciting...

read more
Wren:IDM Cookbook

Wren:IDM Cookbook

We have created a selection of step-by-step recipes (samples) demonstrating key Wren:IDM features to make the beginnings easier.

read more
Why consider Zero Trust

Why consider Zero Trust

Zero Trust is a security model that assumes every access to a network, application, or data storage must be verified and authorized.

read more
New Redesigned ISIC Mobile app

New Redesigned ISIC Mobile app

We have been working with ISIC - International Student Identity Card for over 10 years. That's why we're thrilled that we were able to create a brand new mobile app for them in collaboration with SYNETECH. In its modern and secure user environment students from all...

read more