PinnedPublished inIdentity And Access Management (IAM)Modern Authentications SeriesWelcome to the introductory installment of our Modern Authentications series. This series aims to provide you with a comprehensive…Jun 15, 2023Jun 15, 2023
How to run Kubernetes Dashboard on with local admin userIf you’re deploying the Kubernetes Dashboard for the first time, you’ve probably been hit with the dreaded “Please enter a bearer token to…Oct 311Oct 311
Understanding OAuth 2.0: Architecture, Use Cases, Benefits, and Limitations (Part 3 — PKCE)During our previous discussion in OAuth 2.0 Part 1, we focused on comprehending the distinctions between SAML and OAuth 2.0, as well as…Jul 11, 2023Jul 11, 2023
Published inITNEXTUnderstanding OAuth 2.0: Architecture, Use Cases, Benefits, and Limitations (Part 2)This article is the continuation of the Understanding OAuth 2.0 part 1. To enhance comprehension, I strongly recommend reviewing the…Jul 1, 2023Jul 1, 2023
Published inITNEXTUnderstanding OAuth 2.0: Architecture, Use Cases, Benefits, and Limitations (Part 1)As I discussed about SAML Authentication in the previous article, let’s now try to understand OAuth 2.0 process.Jul 1, 2023Jul 1, 2023
Published inITNEXTSAML Authentication: A Comprehensive Examination of Architecture, Use Cases, Benefits, and…Secure Assertion Markup Language (SAML) is a protocol that allows the exchange of authentication and authorization data between parties…Jun 26, 2023Jun 26, 2023
Published inIdentity And Access Management (IAM)Identity and Access Management Basic ConceptsBefore dive into the modern authentication topics lets clarify few basic concepts of Identity and Access Management.Jun 21, 2023Jun 21, 2023