Miguel Treviñodevblog.verifik.co·Sep 13, 2023Identity Validation in Colombia via API. Fraud prevention made easy!In an era where identity verification is paramount, Verifik emerges as a beacon of trust for businesses and individuals alike in Colombia. With its state-of-the-art technology, Verifik offers a seamless way to validate identities directly from govern...DiscussColombia
SuperTokenssupertokens.hashnode.dev·Aug 31, 2023Understanding JWKS (JSON Web Key Set)Introduction JWTs or Json Web Tokens play a pivotal role in modern authentication. They are most commonly used to identify authenticated users and validate API requests. Part of this verification process requires the use of cryptographic keys to vali...DiscussIdentity
SuperTokenssupertokens.hashnode.dev·Aug 7, 2023Authentication vs Authorization: What's the difference?Introduction Although they are often conflated with each other, Authentication and Authorization represent two fundamentally different aspects of security that work together in order to protect sensitive information. In this blog, we will go over som...DiscussIdentity
Darren Robinsondarrenjrobinson.hashnode.dev·Jun 30, 2023PowerShell Automation for 1PasswordOver two years ago I authored a PowerShell Module that enabled the automation of 1Password. I created the module because I wanted to be able to: Securely store locally a configuration for accessing a 1Password online Vault Automate authentication a...Discuss·3 likes·65 reads1password
Eyal KatzforSlauth.io - The IAM Copilot's blogblog.slauth.io·Jun 28, 2023A Step-by-Step Guide to Cloud Identity ManagementCloud Identity Management empowers organizations to strengthen security, streamline operations, and maintain compliance in the ever-evolving cloud landscape. As your company scales, so do your workloads and services connected to your cloud infrastruc...Discuss·134 readsIAM management best practicesCloud
Abdulrazaq Ramattamhar.hashnode.dev·Jun 9, 2023Who am I?I am not the roles I play. I am not what I do. I am not what I create. My creations come from me, but they are not me. So please don't identify me with what I do, express or create, but rather by my essence. I sure have many roles that I play, but I ...Discusssoul
Bobur UmurzokovforApache APISIXapisix.hashnode.dev·Apr 17, 2023Dynamic routing based on JWT Claim with Apache APISIX and OktaDynamic routing is a powerful feature of most modern API Gateways that allows you to route incoming requests in real time to different backend services based on various criteria such as HTTP headers, query parameters, or even the request body. By lev...Discuss·24 likes·61 readsAPIs
Bobur Umurzokovboburadvocate.hashnode.dev·Apr 17, 2023Dynamic routing based on user credentials with API GatewayDynamic routing based on JWT Claim with Apache APISIX and Okta Dynamic routing is a powerful feature of most modern API Gateways that allows you to route incoming requests in real time to different backend services based on various criteria such as H...DiscussAPIs
Antoine LOIZEAUblog.smartcloudarchitect.fr·Apr 7, 2023Migrer votre Azure automation vers une identité managéeSur vos ressources Azure Automation, vous pourrez trouver ce message vous rappelant de faire cette mise à jour du service: Pour ce faire rien de plus simple, il suffit de se rendre dans la partie "Account Settings" et de cliquer sur Identity. Ici vo...Discuss·72 readsAzureautomation
Antonio Cheltenhamblog.cheltenham.dev·Mar 31, 2023The Power of Automation and IntelligenceOur previous articles delved into MFA Fatigue, recommendations to lower the risk of unauthorized access, and understanding who has access to what. This article will explore how to make your Identity Access Management (IAM) program smarter by introduc...Discuss·36 readsIAM