Access Control

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

Matt Elgin
·
Access Control
·
November, 2022

Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.

Traefik Hub in a World of GitOps

Traefik Hub in a World of GitOps

Gerald Croes
·
GitOps
·
November, 2022

Code is at the center of everything, from source code files or API calls. A headless, programmatic approach lets you reap the benefits of GitOps.

The Configuration of an Encryption Key — Post-Modern Evolution

The Configuration of an Encryption Key — Post-Modern Evolution

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

This is the third and last part of our journey through time to discover the art of cryptography and the configuration of an encryption key, from ancient times until today.

The Evolution of Cryptography in Modern History

The Evolution of Cryptography in Modern History

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

Jump into our time machine and join us on a journey to explore the evolution of cryptography, the art of making a message secret through history.

The Art of Cryptography in Ancient and Medieval History

The Art of Cryptography in Ancient and Medieval History

Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

We invite you to jump into a time machine and join us on a journey to discover cryptography, the art of making a message secret through history.

Announcing the General Availability of Traefik Hub 1.0

Announcing the General Availability of Traefik Hub 1.0

Emile Vauge
·
Product News
·
October, 2022

We are thrilled to announce the general availability of Traefik Hub which adds exciting new capabilities.

Centralizing and Standardizing OIDC at the API Gateway Level

Centralizing and Standardizing OIDC at the API Gateway Level

Matt Elgin
·
Access Control
·
October, 2022

Anyone with experience managing computer systems knows the importance of identity and access management (IAM). In this blog post, we will discuss the evolution of IAM.

Announcing Traefik Proxy 2.9

Announcing Traefik Proxy 2.9

Douglas De Toni Machado
·
Product News
·
October, 2022

The Traefik Proxy 2.9 release is here and it comes with canary deployments for Consul and Nomad, support for ECS Anywhere, default certificate with ACME, and much more!

Manage your APIs at a Glance using the Traefik Enterprise API Portal

Manage your APIs at a Glance using the Traefik Enterprise API Portal

Nicolas Mengin
·
API Management
·
September, 2022

APIs have become the standard method for companies to meet their B2B needs. In this article, we explore the Traefik Enterprise API Portal and show you how to configure it for basic and more advanced needs.

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.