Tag: authentication

  • Thumbnail for GitHub Action Gotchas

    GitHub Action Gotchas

    I started with GitHub Actions a couple years ago. Recently I came across a few interesting use cases while I was trying to setup Terraform…

    Read
  • Thumbnail for Build and Manage Kubernetes Clusters

    Build and Manage Kubernetes Clusters

    There are numerous options to build a Kubernetes cluster. If your company has a multi-cloud strategy, most likely you will have to deal with cluster…

    Read
  • Thumbnail for Istio Lab – Authentication and Authorization

    Istio Lab – Authentication and Authorization

    My previous blog discussed as service mesh what Istio can offer in terms of authentication and authorization capabilities. Istio can authenticate an incoming HTTP request,…

    Read
  • Thumbnail for Istio Authentication and Authorization

    Istio Authentication and Authorization

    Applications running on Kubernetes platform seeks to offload common non-business features to the platform. Istio helps Kubernetes bridge that gap. It can enforce mTLS communication,…

    Read
  • Public Key Infrastructure (PKI) – Introduction

    A public-key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read