PinnedEge AytininBetter ProgrammingExploring Zanzibar: Google’s Authorization SystemDemonstration of its basicsApr 10, 2023Apr 10, 2023
Ege AytininPermify Tech BlogOpa Gatekeeper: How To Write Policies For Kubernetes ClustersLearn how to leverage OPA Gatekeeper to write and enforce policies in Kubernetes clusters, ensuring security and efficient resource…Jul 3Jul 3
Ege AytininPermify Tech BlogConsistent Hashing: An Overview and Implementation in GolangIn this post, we delve into the details of consistent hashing, and show the implementation of it using Golang.Jul 2Jul 2
Ege AytininPermify Tech BlogImplementing Role Based Access Control (RBAC) in Node.js and Express AppIn this article, you will learn you how to implement Role Based Access Control (RBAC) into a Node.js and Express application in mere…Jun 251Jun 251
Ege AytininPermify Tech BlogHow to Implement Two-Factor Authentication (2FA) with TOTP in GolangIn this tutorial, we will explore Two-Factor Authentication (2FA) using TOTP by implementing it in a Golang app.Jun 181Jun 181
Ege AytininPermify Tech BlogImplementing Role Based Access Control in SvelteKitIn this guide, you will learn you how to implement Role Based Access Control (RBAC) into a SvelteKit application in mere minutes.Jun 11Jun 11
Ege AytininPermify Tech BlogJWT vs PASETO: New Era of Token-Based AuthenticationThis article delves into a comprehensive comparison of Paseto and JWT, dissecting their core functionalities, security features, and…Jun 615Jun 615
Ege AytininJavaScript in Plain EnglishHow to Add Firebase Authentication To Your NodeJS AppSecurity is an absolute must for any application, whether you are building a simple pet project or a potential unicorn startup.May 142May 142
Ege AytininStackademicBuilding Scalable GraphQL Microservices With Node.js and Docker: A Comprehensive GuideThis guide covers building scalable GraphQL microservices with Node.js and Docker, providing the knowledge to architect and deploy highly…Apr 251Apr 251
Ege AytininPermify Tech BlogPolicy-Based Access Control (PBAC): A Comprehensive OverviewIn this piece we're focusing on the PBAC model also known as Policy-Based Access Control and how it differentiates itself from traditional…Apr 91Apr 91