InfoQ Homepage Identity Management Content on InfoQ
-
The Many Facets of “Identity”
Radia Perlman describes what aspects of identity and authentication blockchain might address, and compares a “blockchain“ approach with what is deployed today.
-
Implementing Passwordless Logins with WebAuthn Protocol
Adib Saikali overviews the Web Authentication protocol which enables secure user-friendly authentication processes. He is using a sample Spring Security-based application.
-
Authorization at Netflix Scale
Travis Nelson discusses Netflix’s approach to scaling and shares techniques for distributed caching and isolating failure domains.
-
Enabling Secure Code at Scale with Spring and OAuth2
Matt Ruel and Darren Forsythe discuss using Spring Security and OAuth2 to secure an application.
-
User & Device Identity for Microservices @ Netflix Scale
Satyajit Thadeshwar provides useful insights on how Netflix implemented a secure, token-agnostic, identity solution that works with services operating at a massive scale.
-
Securing Services Using SSO
Shraya Ramani talks about BuzzFeed’s transition to microservices and their open-source, homegrown, centralized solution - SSO.
-
Securing OAuth 2.0 Resources in Spring Security 5
Josh Cummings and Joe Grandja take a look at two insecure applications--one a web application and the other a REST API--and integrate them both with an OAuth 2.0 Authorization Server.
-
Blockchain-Based Identity Management & Upcoming ICO
Armin Ebrahimi discusses how ShoCard uses the blockchain technology to address privacy concerns in identity management.
-
Cloud Foundry UAA as an Identity Gateway
Sree Tummidi discusses the capabilities of Cloud Foundry’s UAA which make it apt to be used as an identity gateway for both ingress and egress security patterns.
-
Enable Authentication and Authorization with Azure Active Directory and Spring Security
Yawei Wang shows through a live coding session how to use Spring Security to enable Azure Active Directory authentication and authorization.
-
Next Generation OAuth Support with Spring Security 5.0
Joe Grandja overviews OAuth 2.0 Login and walks through the necessary steps in setting up OAuth 2.0 Login using Google as the authentication provider.
-
Beyond OAuth2: End to End Microservice Security
Will Tran discusses enforcing microservices’ security policies with OAuth2.