Releasing safe and useful code for GOV.UK Verify
...to why this cannot be done for specific subsets of the source code). This post is about how we’re going to open up our code. It explains what we’ve opened...
...to why this cannot be done for specific subsets of the source code). This post is about how we’re going to open up our code. It explains what we’ve opened...
...published We made the first small step towards opening up our codebase this year when we published a small module of code. There is a lot more to come in...
...The codebase for GOV.UK Verify is mainly java microservices at the backend. At the frontend we use Jade as our templating language. However, we’re currently rebuilding the frontend of the...
...in our codebase and allow us to deploy new code faster Things we plan to do next Over the Christmas period we have a change freeze and are not deploying...
...app to generate a security code or to receive a security code on your landline phone, rather than waiting for a text to arrive, so you don’t need a mobile...
James Stewart has published a post about how GDS decides when it's ok not to publish source code. The identity assurance programme operates within the approach outlined by James. We...
Today we're publishing two posts that explain what we're doing to protect users' privacy when they use GOV.UK Verify. For the last three years we've been working with our Privacy...
Today we held our monthly meeting for service managers that are planning to start using GOV.UK Verify. Janet recently wrote about the services that plan to start using GOV.UK Verify...
...towards the end of last year. Reducing our technical debt There are things we need to do to the GOV.UK Verify codebase to tidy up accumulated impact of having made...
...standards for identity assurance. The service auditors are accredited by the United Kingdom Accreditation Service (UKAS) for carrying out service assessments. Compliant with contractual requirements Each certified company operates under...