<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.iamsecure.dev/basics/the-why-of-url-encoding.md-to-the-why-of-url-encoding/</loc>
<lastmod>2018-01-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/base64-encoding/</loc>
<lastmod>2018-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/hashing-it-out-a-deep-dive-into-hashing/</loc>
<lastmod>2018-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/secret-codes-magic-keys-and-symmetric-encryption-a-fun-adventure/</loc>
<lastmod>2018-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/two-magic-keys-and-the-enchanting-world-of-asymmetric-encryption/</loc>
<lastmod>2018-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/superheroes-unite-the-epic-odyssey-of-hybrid-encryption-and-the-magic-keys/</loc>
<lastmod>2018-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/the-cryptographic-chronicles-adventures-in-the-land-of-digital-signatures/</loc>
<lastmod>2018-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/the-magical-tale-of-private-and-public-keys/</loc>
<lastmod>2018-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/The-Super-Duper-Adventure-of-Single-Sign-On-A-Magical-Password-Quest/</loc>
<lastmod>2018-09-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/basics/The-Magical-Duel-of-Signing-and-Verifying-A-Tale-from-Cryptography-Land/</loc>
<lastmod>2018-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/iam/The-Essential-Journey-into-Identity-and-Access-Management-(IAM)-Why-Custom-Solutions-Just-Don't-Cut-It/</loc>
<lastmod>2018-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/Active-Directory-and-LDAP-A-Friendly-Guide-to-Understanding-Two-Digital-Librarians/</loc>
<lastmod>2018-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/Unlocking-the-Magic-of-Delegated-Authentication/</loc>
<lastmod>2019-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/SAML-vs-LDAP-Navigating-Modern-IAM/</loc>
<lastmod>2019-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/Unlocking-SAML-The-Geek's-Guide-to-IAM/</loc>
<lastmod>2019-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/SAML-sequence-diagram/</loc>
<lastmod>2019-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/what-are-all-those-elements-in-a-SAML-response/</loc>
<lastmod>2019-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/how-does-SAML-verification-work/</loc>
<lastmod>2019-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/what-prevents-a-SAML-token-from-being-tampered/</loc>
<lastmod>2019-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/how-does-SAML-assertion-encryption-work/</loc>
<lastmod>2019-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/how-does-SAML-assertion-decryption-works/</loc>
<lastmod>2019-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/how-does-SAML-logout-work/</loc>
<lastmod>2019-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/saml/springboot-integration-with-SAML-and-okta/</loc>
<lastmod>2019-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/oauth,%20sailpoint,%20okta/what-is-OAuth-and-why-do-we-need-it/</loc>
<lastmod>2020-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/oauth,%20sailpoint,%20okta/Challenges-in-understanding-OAuth/</loc>
<lastmod>2020-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/oauth,%20sailpoint,%20okta/opaque-token-vs-structured-token/</loc>
<lastmod>2020-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.iamsecure.dev/about/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/archive/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/contact/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/tags/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/page2/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/page3/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/page4/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/page5/</loc>
</url>
<url>
<loc>https://blog.iamsecure.dev/page6/</loc>
</url>
</urlset>
