Authentication

close up shot of keyboard buttons

http4s – Dig Deeper

Reading Time: 3 minutes Our previous blog on http4s gives us an introduction to the library to create HTTP routes, servers and clients. Using the library’s support for various libraries like Ember, Blaze, we can create any type of server and/or client. The library also provides for other libraries for easy encoding/decoding of request and response body using circe, scala-xml, and fs2-data. Ultimately, the heart of the library lies Continue Reading

Ways to Handle Log-in Pop-up in Selenium Webdriver

Reading Time: 3 minutes Welcome again! Ever think of handling Log-in Pop-up via Selenium? Let’s take a quick overview of the scenario. What’s the need for automating log-in Pop-up? For security reasons, some of the web pages did not have access to normal users. As only authenticated users with correct credentials can access web pages. We can automate this by using selenium. What the pop-up mean and where it Continue Reading

Configure Kerberos server and client

Reading Time: 4 minutes Before moving ahead to the configuration of Kerberos let’s discuss why we need Kerberos. In this digital world, cybercrime is increasing in ways where no companies are safe. Cyber attackers are targeting companies to steal important data. For good practice, companies should adopt powerful solutions which help to keep their data secure and safe from these attackers. Today I am talking about a most secure Continue Reading

Authentication and Authorization in Microservices

Reading Time: 3 minutes Microservices Architecture has been gaining a lot of ground as the preferred architecture for implementing solutions as it provides benefits like scalability, logical and physical separation, small teams managing a part of the functionality, flexibility in technology etc. But these benefits come at a cost of simplicity since microservices are distributed the complexity of managing them increases. One of the key challenges is how to Continue Reading