Basics & Standards

Fundamentals, Concepts, and standards

  • Thumbnail for OAuth 2.0 and OIDC 2 of 2

    OAuth 2.0 and OIDC 2 of 2

    I wrote a brief on this topic a while back. Now I need to configure OIDC in a few occasions I decide to dive deeper…

    Read
  • Thumbnail for GraphQL and gRPC

    GraphQL and gRPC

    Big Picture For inter-process communication at a high level, the two styles are asynchronous and synchronous styles: RPCs, built on top of TCP/UDP, are usually…

    Read
  • Public Key Infrastructure (PKI) – Introduction

    A public-key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates…

    Read
  • How imaging devices talk to each other (in DICOM)

    Overview In the previous post I briefly touched on DICOM as the crucial standard in medical imaging for both data exchanging and data storage. It…

    Read
  • How RPC and NFS work

    I touched on NFS in several previous postings, and here is a deeper dive of this particular protocol. NFS is built on top of Remote…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read