Tag: authentication

  • OAuth 2.0 and OIDC 2 of 2

    I wrote a brief on this topic a while back. Now I need to configure OIDC in a few occasions I decide to dive deeper…

    Read
  • GitHub Action Gotchas

    I started with GitHub Actions a couple years ago. Recently I came across a few interesting use cases while I was trying to setup Terraform…

    Read
  • Istio Authentication and Authorization

    Applications running on Kubernetes platform seeks to offload common non-business features to the platform. Istio helps Kubernetes bridge that gap. It can enforce mTLS communication,…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read
  • Introduction to Authentication Frameworks (PAM and SSPI)

    This article gives a very brief high-level introduction to PAM (Pluggable Authentication Module) and SSPI (Security Support Provider Interface) as authentication frameworks in Linux and…

    Read
  • OAuth 2.0 and OIDC 1 of 2

    OAuth 2.0 and OpenID Connect (OIDC 1.0) are different but highly related protocols and they are often confused. When we talk about IAM (identity and…

    Read