Authentication

Configure Kerberos server and client

Reading Time: 4 minutes Before moving ahead to the configuration of Kerberos let’s discuss why we need Kerberos. In this digital world, cybercrime is increasing in ways where no companies are safe. Cyber attackers are targeting companies to steal important data. For good practice, companies should adopt powerful solutions which help to keep their data secure and safe from these attackers. Today I am talking about a most secure Continue Reading

Authentication and Authorization in Microservices

Reading Time: 3 minutes Microservices Architecture has been gaining a lot of ground as the preferred architecture for implementing solutions as it provides benefits like scalability, logical and physical separation, small teams managing a part of the functionality, flexibility in technology etc. But these benefits come at a cost of simplicity since microservices are distributed the complexity of managing them increases. One of the key challenges is how to Continue Reading