SSO Token

SSO Token

Successful implementation of SSO token encryption requires careful consideration of several challenges to provide a secure and user-friendly authentication experience within the SSO ecosystem.

learn more
Why It’s Important to Replace a Server

Why It’s Important to Replace a Server

The benefits of improved performance, capacity, and security combined with the reduction of maintenance, downtime, and resources are a clear indication a regular system migration to a new server should be heavily considered by a software team.

learn more
.NET Framework

.NET Framework

With .NET 7 Core Framework, clients are jumping into the most up-to-date and flexible framework released by Microsoft, keeping up with technology and security trends. The payoff for RSI clients will be immense.

learn more
Working with Polly Reporting

Working with Polly Reporting

Occasionally, challenges arise when servers aren’t quick to respond, and processes fail to download or upload information at the time they were attempting to. These challenges could cause crucial information to not transfer to its appropriate destination in a timely manner. One way RSI continues to improve capability is to handle these interactions with the implementation of the asynchronous retry policies provided by Polly.

learn more
OAUTH

OAUTH

One of RSI’s processes is monitoring a primary email address for a client and performing various operations on incoming messages, including scanning attachments. A primary crux of the process is the authorization protocol used to provide process access to incoming messages.  Recently RSI updated to OAUTH 2.0, the industry standard for online authorization.

learn more