Blog

Announcing Traefik Enterprise 2.9

Announcing Traefik Enterprise 2.9

Nicolas Mengin
Nicolas Mengin
·
Access Control
·
November, 2022

Traefik Enterprise 2.9 is here with improvements for the JWT middleware, native support for canary deployments in Consul and Nomad, and more!

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

3 OIDC Configurations with Traefik Enterprise, from Basic to Advanced

Matt Elgin
Matt Elgin
·
Access Control
·
November, 2022

Distributed systems require a strategic approach to authentication and authorization. Here, we walk through three configurations in which Traefik Enterprise is used to enforce access control via OIDC.

Traefik Hub in a World of GitOps

Traefik Hub in a World of GitOps

Gerald Croes
Gerald Croes
·
GitOps
·
November, 2022

Code is at the center of everything, from source code files or API calls. A headless, programmatic approach lets you reap the benefits of GitOps.

The Configuration of an Encryption Key — Post-Modern Evolution

The Configuration of an Encryption Key — Post-Modern Evolution

Jean-Baptiste Doumenjou
Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

This is the third and last part of our journey through time to discover the art of cryptography and the configuration of an encryption key, from ancient times until today.

Traefik's API Gateway Accelerates and Consolidates ABAX's Journey to the Cloud

Traefik's API Gateway Accelerates and Consolidates ABAX's Journey to the Cloud

Traefik Labs
Traefik Labs
·
Case Studies
·
November, 2022

With the help of Traefik's API Gateway, ABAX completed its cloud migration and reaped the benefits of a cloud native networking solution.

The Evolution of Cryptography in Modern History

The Evolution of Cryptography in Modern History

Jean-Baptiste Doumenjou
Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

Jump into our time machine and join us on a journey to explore the evolution of cryptography, the art of making a message secret through history.

The Art of Cryptography in Ancient and Medieval History

The Art of Cryptography in Ancient and Medieval History

Jean-Baptiste Doumenjou
Jean-Baptiste Doumenjou
·
Access Control
·
November, 2022

We invite you to jump into a time machine and join us on a journey to discover cryptography, the art of making a message secret through history.

9 Best Practices for Designing Microservice Architectures

9 Best Practices for Designing Microservice Architectures

Manuel Zapf
Manuel Zapf
·
Microservices
·
October, 2022

It is not easy to maintain a resilient network in microservices-based architectures. Here, we discuss 9 best practices for designing microservices that operate efficiently and effectively.

Announcing the General Availability of Traefik Hub 1.0

Announcing the General Availability of Traefik Hub 1.0

Emile Vauge
Emile Vauge
·
Product News
·
October, 2022

We are thrilled to announce the general availability of Traefik Hub which adds exciting new capabilities.