PinnedEge AytininBetter ProgrammingExploring Zanzibar: Google’s Authorization SystemDemonstration of its basicsApr 10, 2023Apr 10, 2023
Ege AytinHow to Add Firebase Authentication To Your NodeJS AppSecurity is an absolute must for any application, whether you are building a simple pet project or a potential unicorn startup.May 142May 142
Ege AytinBuilding Scalable GraphQL Microservices With Node.js and Docker: A Comprehensive GuideThis guide covers building scalable GraphQL microservices with Node.js and Docker, providing the knowledge to architect and deploy highly…Apr 251Apr 251
Ege AytininPermify Tech BlogPolicy-Based Access Control (PBAC): A Comprehensive OverviewIn this piece we're focusing on the PBAC model also known as Policy-Based Access Control and how it differentiates itself from traditional…Apr 9Apr 9
Ege AytinOAuth 2.0 Implementation in Node.jsToday, so many applications’ functionality requires accessing resources hosted on other applications or platforms on behalf of a user…Mar 201Mar 201
Ege AytininPermify Tech BlogMicroservices Authentication and Authorization Using API GatewayIn this tutorial, we explore microservices security, guiding you through setting up microservices and creating an API Gateway with Golang…Mar 12Mar 12
Ege AytininPermify Tech BlogTop 6 Open Source Identity and Access Management (IAM) Solutions For EnterprisesIn this piece, you will explore the six most popular open-source IAM solutions that enterprises choose, and learn about the factors to…Feb 29Feb 29
Ege AytininPermify Tech BlogAttribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)In this piece, you will learn the process of implementing ABAC using Open Policy Agent (OPA) and understand how it all fits in when…Feb 20Feb 20
Ege AytininTowards DevGoogle Zanzibar: How Google solved authorization globally across all its productsIn this article we’ll examine Zanzibar, which is the global authorization system used at Google for handling authorization for hundreds of…Feb 15Feb 15
Ege AytininPermify Tech BlogFine Grained Access Control: Where RBAC Falls ShortLearn what fine-grained access control is, where it is used, its importance, and how to choose the right authorization granularity for your…Feb 13Feb 13