Let's explore the history of APIs to understand how and why they have become such an integral part of modern software development.
Learn everything you need to know about the reverse proxy, ingress controller, and API gateway, their differences, and when you need to use them.
Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.
It is not easy to maintain a resilient network in microservices-based architectures. Here, we discuss 9 best practices for designing microservices that operate efficiently and effectively.
Anyone with experience managing computer systems knows the importance of identity and access management (IAM). In this blog post, we will discuss the evolution of IAM.
APIs have become the standard method for companies to meet their B2B needs. In this article, we explore the Traefik Enterprise API Portal and show you how to configure it for basic and more advanced needs.
Traefik Enterprise 2.8 is here with API Portal segmentation, improvements to our HashiCorp integrations, OAuth Introspection middleware enhancements, and more!
Read how AmeriSave migrated their architecture into the cloud using Traefik Enterprise as Ingress and API gateway.