With the rise of AI agents, many organizations want to expose information that differentiates their business. Doing so has several potential business benefits: attracting new parties at internet scale, monetizing those connections, and enabling new and dynamic user experiences. APIs expose data to the outside world and support many types of clients, like web or ...| Nordic APIs
Mobile apps are more exposed than web apps. Learn layered strategies to secure secrets, block MitM attacks, and stop bot farms.| Nordic APIs
Learn how to prevent unauthorized API access with scoped tokens, gateways, WAFs, TLS, rate limits, and input validation.| Nordic APIs
Istio supports integration with many different projects. The Istio blog recently featured a post on L7 policy functionality with OpenPolicyAgent. Kyverno is a similar project, and today we will dive how Istio and the Kyverno Authz Server can be used together to enforce Layer 7 policies in your platform. We will show you how to get started with a simple example. You will come to see how this combination is a solid option to deliver policy quickly and transparently to application team everywher...| Istio Blog
Shared computing platforms offer resources and shared functionality to tenant teams so that they don’t need to build everything from scratch themselves. While it can sometimes be hard to balance all the requests from tenants, it’s important that platform teams ask the question: what’s the highest value feature we can offer our tenants? Often work is given directly to application teams to implement, but there are some features that are best implemented once, and offered as a service to a...| Istio Blog
Background Istio’s authorization policy provides access control for services in the mesh. It is fast, powerful and a widely used feature. We have made continuous improvements to make policy more flexible since its first release in Istio 1.4, including the DENY action, exclusion semantics, X-Forwarded-For header support, nested JWT claim support and more. These features improve the flexibility of the authorization policy, but there are still many use cases that cannot be supported with this ...| Istio Blog
Sohan Maheshwar breaks down why authorization and developer relations are the real game-changers in today’s tech world. The post Sohan Maheshwar: Authorization Is Key to App Security – Don’t Get It Wrong! appeared first on ShiftMag.| ShiftMag
Today, I'm going to answer a question asked by Łukasz Biały on Twitter: Is there a way to get field-level RBAC (Role-Based Access Control)? It turns out there is! However, Caliban's approach to authentication and authorization is quite flexible. In...| Pierre Ricadat's Tech Blog
Datalog is a logic programming language, based on Prolog, which is seeing something of a resurgence in interest in recent years. In particular, several recent approaches to authorization (working out who can do what) have used Datalog as the logical basis for access control decisions. On the face of it, this seems like a perfect […]| Neil Madden
Benefits of using the Model Context Protocol (MCP) with OAuth and how to implement it using ZenStack and MCP SDK.| zenstack.dev
I’m excited to to be travelling to Bonn, Germany, and to speak at the upcoming Cloud Identity Summit 2022, which will be held September 22nd at adesso SE, close to the city of Bonn. This is my second time speaking at the Cloud Identity Summit, the first time was in 2020 and that was a […]| GoToGuy Blog
This is part of my series on Azure Authorization. Azure Authorization – The Basics Azure Authorization – Azure RBAC Basics Azure Authorization – actions and notActions Azure Autho…| Journey Of The Geek
Before you can list a Selling Partner API application on the Marketplace Appstore, you need to set up an authorization workflow. Here's how.| Jesse Evers
An intense and unforgettable two days for the OpenID Foundation at the March 2025 Gartner Identity & Access Management Summit in London.| OpenID Foundation - Helping people assert their identity wherever they choose
Healthcare providers need to communicate with a patient's loved ones. But how do you know what to share with a patient's family and friends and still remain HIPAA-compliant?| The HIPAA E-Tool
Hello fellow geeks! Today I’m going to take a break from my AI Foundry series and save your future self some time by walking you through a process I had to piece together from disparate links…| Journey Of The Geek
This is a part of my series on AI Foundry: AI Foundry – The Basics AI Foundry – Credential vs Identity Data Stores AI Foundry – Identity, Authentication, and Authorization Yes, I’m goin…| Journey Of The Geek
2025 Thursday February 20th Meeting 6:30pm:8:30pm Location: American Red Cross 3131 N Vancouver Ave · Portland, OR Speaker: Jacob Champion We are going to have Jacob walk us through recent work on …| PDXPUG
This is a part of my series on AI Foundry: Hello again folks. Today, I’m going to continue my series on AI Foundry. I’ve been scratching my head on how best to tackle this series, because the service consists of so many foundational services plumbed together into a larger solution so there is a lot […]| Journey Of The Geek
This is a part of my series on AI Foundry: AI Foundry – The Basics AI Foundry – Credential vs Identity Stores Happy New Year! Over the last few months of 2024, I was buried in AI Foundr…| Journey Of The Geek
CIAM has emerged to help businesses secure, manage, and personalize customer identities, ensuring seamless and compliant digital experiences.| Nordic APIs
Learn how to protect HTTP backend services with Ory products using Oathkeeper as proxy-server and Kratos as authentication server.| developer-friendly.blog
This is a project design I am currently working on to consume SPIFFE( Secure Production Identity Framework For Everyone ) bootstrapped t...| pushpalankajaya.blogspot.com
Secure your Azure resources with Bastion. Learn to implement and optimize this powerful tool for seamless, cost-effective remote access and compliance.| developer-friendly.blog
Leveraging Ory Keto, Permission Handler and Policy Enforcer for Scalable and Secure Access Control: A Developer's Guide to RBAC and ABAC.| developer-friendly.blog
Learn how to grant an Azure Virtual Machine access to AWS services without passing hard-coded credetials, with the power of OpenID Connect.| developer-friendly.blog
Learn how to automate your TLS certificate retrieval from AWS & Cloudflare in Kubernetes using the cert-manager operator.| developer-friendly.blog
A long standing request from OpenFaaS users has been to add built-in authentication for functions. This would allow you to secure your function endpoints without having to write any additional code.| OpenFaaS - Serverless Functions Made Simple
Here's my top 20 talks on authorization at Identiverse (plus a few bonus ones). The post Identiverse Authorization Talks – Identiverse Agenda appeared first on Harvesting web technologies.| Harvesting web technologies
FYI I love acronyms: acronym soup, acronyms al dente, acronym au jus… Acronyms FTW. So, when I started working on a new article for the IDPro newsletter, it only felt natural to tackle OWASP and IAM. O’ What, you ask? Let’s dive right in. What’s IAM? Most of the readership here is familiar with IAM: Identity & Access Management. I’ll refer back to IDPro’s book of knowledge for definitions. Turn to the terminology section for the following: In short, Identity & Access Management (I...| Harvesting web technologies
A short while ago, someone asked why ABAC has been so slow to adopt on https://security.stackexchange.com/. Here’s my take below. Top 5 reasons ABAC has been slow to adapt But ABAC is still worth it… Everyone’s talking about it. Should you do it? I’m biased so I’ll say yes. But don’t take my word for it. Look at NIST’s Guide to Attribute Based Access Control (ABAC) Definition and Considerations, Gartner’s research, as well as Kuppinger Cole and Group 451. So how can you speed ...| Harvesting web technologies
Many of you will be familiar with Randall Munroe’s fantastic xkcd cartoon site. He’s even got a strip for what I’m going to talk about… Standards. I’d been a member and editor of the XACML Technical Committee for about a decade until I decided to move on to the world of Consumer Identity (CIAM) before returning a few months ago to my first love. In the time I was away, new standards emerged (Rego, Oso, Cedar, Zanzibar) and so it felt about time I hopped onto the standardization band...| Harvesting web technologies
Originally published on IDPro. For the first time ever, Identiverse headed to Vegas for its annual conference. It was a hit, as always, and judging by the agenda, some of the hot topics were passwordless authentication, AI, and last but definitely not least, authorization. My eyes were gleaming! We’re making authorization great again! Much Ado about Authorization I was delighted to see so much activity around authorization, both in the standards track, the vendor track, and the keynotes. On...| Harvesting web technologies
Attribute-based access control is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. The post Why does attribute-based access control matter? appeared first on Harvesting web technologies.| Harvesting web technologies
In versions of Istio prior to 1.4, security policy was configured using v1alpha1 APIs (MeshPolicy, Policy, ClusterRbacConfig, ServiceRole and ServiceRoleBinding). After consulting with our early adopters, we made major improvements to the policy system and released v1beta1 APIs along with Istio 1.4. These refreshed APIs (PeerAuthentication, RequestAuthentication and AuthorizationPolicy) helped standardize how we define policy targets in Istio, helped users understand where policies were appli...| Istio Blog
Background Istio’s authorization policy provides access control for services in the mesh. It is fast, powerful and a widely used feature. We have made continuous improvements to make policy more flexible since its first release in Istio 1.4, including the DENY action, exclusion semantics, X-Forwarded-For header support, nested JWT claim support and more. These features improve the flexibility of the authorization policy, but there are still many use cases that cannot be supported with this ...| Istio Blog
Introduction, motivation and design principles for the Istio v1beta1 Authorization Policy.| Istio
Micro-segmentation is a security technique that creates secure zones in cloud deployments and allows organizations to isolate workloads from one another and secure them individually. Istio’s authorization feature, also known as Istio Role Based Access Control, provides micro-segmentation for services in an Istio mesh. It features: Authorization at different levels of granularity, including namespace level, service level, and method level. Service-to-service and end-user-to-service authoriza...| Istio Blog
This is part of my series on Azure Authorization. Azure Authorization – The Basics Azure Authorization – Azure RBAC Basics Azure Authorization – actions and notActions Azure Autho…| Journey Of The Geek
This is part of my series on Azure Authorization. Azure Authorization – The Basics Azure Authorization – Azure RBAC Basics Azure Authorization – actions and notActions Azure Autho…| Journey Of The Geek
To give you a feeling of what to expect at the Endpoint conference we've talked with Kamyar Mohager, who will be in Amsterdam representing Linkedin.| API UX
This is part of my series on Azure Authorization. Azure Authorization – The Basics Azure Authorization – Azure RBAC Basics Azure Authorization – actions and notActions Azure Autho…| Journey Of The Geek
Login & Registration Page with Node.js Express + Angular 17 - JWT Authentication, Role based Authorization with Node, Angular, MySQL example| BezKoder
A comparison of different approaches to implement authorization - those coupled with the database and those decoupled.| zenstack.dev
2/11/2025 Update – This action is now captured in the Entra ID Audit Logs! I’d recommend putting an alert in ASAP to track this moving forward. Hello fellow geek! Today I’m going …| Journey Of The Geek
In my previous post I’ve described how to use Tachiban for authentication in a Hanami 1.3 app. This post will be about using my authorization gem Rokku with Hanami applications.| Stuff from here and there
So in my other life as a strength and conditioning coach, I have a few| startcodingnow.com
This is part of my series on GenAI Services in Azure: Azure OpenAI Service – Infra and Security Stuff Azure OpenAI Service – Authentication Azure OpenAI Service – Authorization Az…| Journey Of The Geek
This is part of my series on GenAI Services in Azure: Azure OpenAI Service – Infra and Security Stuff Azure OpenAI Service – Authentication Azure OpenAI Service – Authorization Az…| Journey Of The Geek