Access Control

Unlock the Potential of Data APIs with Strong Authentication and Traefik Enterprise

Unlock the Potential of Data APIs with Strong Authentication and Traefik Enterprise

Matt Elgin
·
Access Control
·
February, 2023

Exposing data held within legacy systems in a controlled way through APIs, microservices, etc., is often a challenge. Here's how strong authentication can help.

Achieve Zero Downtime Access Control for Your Applications

Achieve Zero Downtime Access Control for Your Applications

Julien Salleyron
·
Access Control
·
February, 2023

Learn how to implement access control for all applications, including legacy, in just a few clicks, with zero downtime, and no changes to the original app.

Exploring the Tailscale-Traefik Proxy Integration

Exploring the Tailscale-Traefik Proxy Integration

Mathieu Lonjaret
·
Access Control
·
January, 2023

In this article, we explore two main ways Traefik Proxy uses Tailscale — one based on the utilization of the TLS management feature and one bonus story for nerds!

Secure Web Applications with Traefik Proxy, cert-manager, and Let’s Encrypt

Secure Web Applications with Traefik Proxy, cert-manager, and Let’s Encrypt

Richard Hillmann
·
Kubernetes
·
January, 2023

Let's dig into how you can use cert-manager to extend Traefik Proxy’s capabilities as a Kubernetes ingress controller to secure your web applications.

Traefik Proxy 3.0 — Scope, Beta Program, and the First Feature Drop

Traefik Proxy 3.0 — Scope, Beta Program, and the First Feature Drop

Douglas De Toni Machado
·
Ingress
·
December, 2022

Traefik Proxy 3.0 Beta 1 is here! Let's explore the new major version and how you can get started with the released features in Beta 1.

Announcing Traefik Enterprise 2.9

Announcing Traefik Enterprise 2.9

Nicolas Mengin
·
Access Control
·
November, 2022

Traefik Enterprise 2.9 is here with improvements for the JWT middleware, native support for canary deployments in Consul and Nomad, and more!

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

Matt Elgin
·
Access Control
·
November, 2022

Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.

Traefik Hub in a World of GitOps

Traefik Hub in a World of GitOps

Gerald Croes
·
GitOps
·
November, 2022

Code is at the center of everything, from source code files or API calls. A headless, programmatic approach lets you reap the benefits of GitOps.

The Configuration of an Encryption Key — Post-Modern Evolution

The Configuration of an Encryption Key — Post-Modern Evolution

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

This is the third and last part of our journey through time to discover the art of cryptography and the configuration of an encryption key, from ancient times until today.

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.