PinnedEge AytininBetter ProgrammingExploring Zanzibar: Google’s Authorization SystemDemonstration of its basicsApr 10, 2023Apr 10, 2023
Ege AytininPermify Tech BlogHow To Build Centralized Authorization SystemLearn what a centralized authorization system is and how you can implement it to streamline access control for your applications and…19h ago19h ago
Ege AytininPermify Tech BlogWhat is SCIM Provisioning: In-Depth Guide [2024]In this article, we will examine SCIM in depth, look at what it is, and review the best providers available.6d ago6d ago
Ege AytininPermify Tech BlogOAuth vs. JWT: Ultimate ComparisonLearn how to use OAuth and JWT to secure web applications. By reading this post, you will gain a clear understanding of when to use each…Jul 16Jul 16
Ege AytininPermify Tech BlogOpa Gatekeeper: How To Write Policies For Kubernetes ClustersLearn how to leverage OPA Gatekeeper to write and enforce policies in Kubernetes clusters, ensuring security and efficient resource…Jul 3Jul 3
Ege AytininPermify Tech BlogConsistent Hashing: An Overview and Implementation in GolangIn this post, we delve into the details of consistent hashing, and show the implementation of it using Golang.Jul 2Jul 2
Ege AytininPermify Tech BlogImplementing Role Based Access Control (RBAC) in Node.js and Express AppIn this article, you will learn you how to implement Role Based Access Control (RBAC) into a Node.js and Express application in mere…Jun 252Jun 252
Ege AytininPermify Tech BlogHow to Implement Two-Factor Authentication (2FA) with TOTP in GolangIn this tutorial, we will explore Two-Factor Authentication (2FA) using TOTP by implementing it in a Golang app.Jun 181Jun 181
Ege AytininPermify Tech BlogImplementing Role Based Access Control in SvelteKitIn this guide, you will learn you how to implement Role Based Access Control (RBAC) into a SvelteKit application in mere minutes.Jun 11Jun 11
Ege AytininPermify Tech BlogJWT vs PASETO: New Era of Token-Based AuthenticationThis article delves into a comprehensive comparison of Paseto and JWT, dissecting their core functionalities, security features, and…Jun 621Jun 621