Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
A file watching facility for Java. Uses native platform support to avoid polling on selected platforms (currently supports win32, Mac OS X, Linux and FreeBSD on x86 platforms). Implements JDK 7's WatchService, but also runs on Java 5 and 6
JmxHist keeps monitoring history of your application's state, via JMX, and stores in a csv file. You can specify MBeans/Attributes to be stored. You can take certain action when an attribute meet a threshold. It shows charts of the data via web.
Let's you synchronize related scheduled jobs, which execute across many different machines. Instead of adding time padding between jobs (which can fail), use this utility. Please feel free to add more functions!