Tag: cloud

  • Common local Git operations

    This is a summary of concepts in common Git operations. We will discuss brach, merge, rebase, cherrypick, stash and reset. Then we’ll discuss pull, fetch,…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read
  • Introduction to Authentication Frameworks (PAM and SSPI)

    This article gives a very brief high-level introduction to PAM (Pluggable Authentication Module) and SSPI (Security Support Provider Interface) as authentication frameworks in Linux and…

    Read
  • SASL Authentication Mechanisms

    Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…

    Read
  • OAuth 2.0 and OIDC 1 of 2

    OAuth 2.0 and OpenID Connect (OIDC 1.0) are different but highly related protocols and they are often confused. When we talk about IAM (identity and…

    Read
  • Security Assertion Markup Language (SAML)

    SAML is an XML-based standard for exchanging authentication and authorization data between IdP (identity provider) and service provider. We can compare SAML with LDAP (as…

    Read