Exposing data held within legacy systems in a controlled way through APIs, microservices, etc., is often a challenge. Here's how strong authentication can help.
Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.
Anyone with experience managing computer systems knows the importance of identity and access management (IAM). In this blog post, we will discuss the evolution of IAM.
In this blog post, I will walk you through how to perform some basic bench testing in a sandbox environment to compare the effects of Redis, cookies, and no authentication on their latency.
Before developers begin scaling an API for widespread use, many critical issues and concerns aren’t always apparent from the outset.