Warren ParadHow does machine to machine authentication work?Machine to machine auth is how you ensure secure communication between individual services, and each service can authorize others to access…Dec 6, 20231Dec 6, 20231
Warren ParadAuthress Academy: Denylists and Invaliding user accessThis article is part of the Authress Academy and discusses the different ways to invalidate a user’s access and revoke their tokens.Jul 5, 2023Jul 5, 2023
Warren ParadBreaking up the monolith: Breaking changesBefore we get into how to handle a breaking change, we should first identify what is even a breaking change.Aug 5, 2022Aug 5, 2022
Warren ParadAWS CloudWatch: How to scale your Logging infrastructureAn obvious story you might decide to tell yourself is Logging is easy. And writing to the console or printing out debugging messages may…May 30, 2022May 30, 2022
Warren ParadStep-up authorizationStep up authorization is the process of converting a user’s auth from a base level to an elevated or privileged state.Apr 8, 2022Apr 8, 2022
Warren ParadBreaking up the monolith: Zero downtime migrationsIt’s pretty common in monolith architectures to have to handle migrations. But this isn’t the only place. Microservices also frequently…Feb 27, 20221Feb 27, 20221
Warren ParadAWS Step Functions: AdvancedThis is the advanced guide to using AWS Step Functions. Step functions enable complex state machines. They track state and execute lambdas…Dec 20, 20211Dec 20, 20211
Warren ParadBreaking up the monolith: Magic identifiersA common pattern often found in software engineering is magic identifiers. These identifiers are used to quickly represent a concept in an…Oct 19, 20211Oct 19, 20211
Warren ParadCan’t connect to service running in EC2One of the most annoying and often challenging issues is solve dreaded connection problems with services running in EC2 (in AWS and with…Sep 20, 2021Sep 20, 2021