It’s really easy to provision a cluster on any of the Kubernetes
cluster providers. All it takes is a few clicks on a web page, a
loaded credit card and your cluster materializes just like that! But,
what if you want to save a few bucks and setup a cluster in your home
or office network, on some hardware you have lying around?
There appear to be a number of solutions that people have
developed. After taking a look at some of them, I decided to do
something that catered to my specific needs. …
This is a continuation of my previous article that I wrote here. This is not a tutorial introduction to OAuth nor is it trying to be overly pedantic. The goal of this article is to show OAuth and OIDC usage to authenticate and access a backend API.
Yep, you read that right! OAuth was designed to eliminate the need to share your social media passwords with companies. In other words, OAuth is all about authorization as opposed to authentication. Perhaps some readers here might remember typing their email and password on third-party web sites willingly. The security implications of forking over your credentials to a third-party should be obvious to anyone. This prompted a bunch of people from different companies to get together and address information sharing without asking the user to give away the password (it’s really bad karma to share passwords with others). …
This is a two-part article on enabling state-of-the art user authentication to your web applications in less time than it takes you to get a Starbucks coffee. Okay, okay! maybe not short but definitely in about the time you spend in a beer bash. You think these days nobody is crazy enough to build their own user authentication, right? Wrong, dear reader! I constantly encounter software with home-grown authentication systems ready for exploitation. I hope this how-to goes a little way in addressing this important aspect of web applications.
In this article, I will show the minimal code needed to integrate third-party authentication service in an application built with Elm. In the second part, I will show how the Elm frontend can securely access the backend. …