Warren ParadHow does machine to machine authentication work?Machine to machine auth is how you ensure secure communication between individual services, and each service can authorize others to access…11 min read·Dec 6, 2023--1--1
Warren ParadAuthress Academy: Denylists and Invaliding user accessThis article is part of the Authress Academy and discusses the different ways to invalidate a user’s access and revoke their tokens.12 min read·Jul 5, 2023----
Warren ParadBreaking up the monolith: Breaking changesBefore we get into how to handle a breaking change, we should first identify what is even a breaking change.11 min read·Aug 5, 2022----
Warren ParadAWS CloudWatch: How to scale your Logging infrastructureAn obvious story you might decide to tell yourself is Logging is easy. And writing to the console or printing out debugging messages may…8 min read·May 30, 2022----
Warren ParadStep-up authorizationStep up authorization is the process of converting a user’s auth from a base level to an elevated or privileged state.6 min read·Apr 8, 2022----
Warren ParadBreaking up the monolith: Zero downtime migrationsIt’s pretty common in monolith architectures to have to handle migrations. But this isn’t the only place. Microservices also frequently…4 min read·Feb 27, 2022--1--1
Warren ParadAWS Step Functions: AdvancedThis is the advanced guide to using AWS Step Functions. Step functions enable complex state machines. They track state and execute lambdas…10 min read·Dec 20, 2021--1--1
Warren ParadBreaking up the monolith: Magic identifiersA common pattern often found in software engineering is magic identifiers. These identifiers are used to quickly represent a concept in an…8 min read·Oct 19, 2021--1--1
Warren ParadCan’t connect to service running in EC2One of the most annoying and often challenging issues is solve dreaded connection problems with services running in EC2 (in AWS and with…4 min read·Sep 20, 2021----