Authorization

Ways to Handle Log-in Pop-up in Selenium Webdriver

Reading Time: 3 minutes Welcome again! Ever think of handling Log-in Pop-up via Selenium? Let’s take a quick overview of the scenario. What’s the need for automating log-in Pop-up? For security reasons, some of the web pages did not have access to normal users. As only authenticated users with correct credentials can access web pages. We can automate this by using selenium. What the pop-up mean and where it Continue Reading

Authorization using Bundle-API in OPA

Reading Time: 3 minutes In the previous blogs (Policy Enforcement using OPA and Go Through with Rego components), we have understood that what is OPA, how it works and the different components of rego so In this blog, we are going to understand what is bundle-API, how we can integrate with OPA and how to inject OPA policy and data at a dynamic time on the cluster with bundle-API. Continue Reading

Authorization using JWT

Reading Time: 3 minutes In this blog, we will discuss how to implement Akka HTTP authorization using JWT. So first let’s see what is JWT. What is JWT JSON Web Token (JWT) defines a compact and self-contained way for securely transmitting information between parties as a JSON object. The token is mainly composed of header, payload, signature. These three parts are separated by dots(.). The header contains a hashing Continue Reading

Go Through with Rego components

Reading Time: 3 minutes In this blog, we’ll understand Rego that uses for declaring policy in OPA(open policy Agent). Rego is a declarative logic programming language, not a programming language. We can get content based on the policy defined by Rego as it’s declarative nature it has many benefits than the imperative language.

Authentication and Authorization in Microservices

Reading Time: 3 minutes Microservices Architecture has been gaining a lot of ground as the preferred architecture for implementing solutions as it provides benefits like scalability, logical and physical separation, small teams managing a part of the functionality, flexibility in technology etc. But these benefits come at a cost of simplicity since microservices are distributed the complexity of managing them increases. One of the key challenges is how to Continue Reading