Home ยป authentication
After the last two post, now we can focus on PKI implementation. The use case is software testing, where we need to create and recycle…
I discussed in my previous post on workload identity and dived into how it works in AKS (Azure Kubernetes Service). In this post I will…
As applications are moved to the cloud, the application workload hosted on virtual machines need to interact with cloud resources. For this, we need an…
Background There are many benefits of using OIDC to authenticate to kube-api server, especially with multiple clusters that need consistent log-in experience. With the last…
I wrote a brief on this topic a while back. Now I need to configure OIDC in a few occasions I decide to dive deeper…
I have two open-source projects to deploy a medical imaging application on different platforms. In both of them, I define DICOM validation scenario, and provide…