In Real Life - Amazon Web Services: Identity Access Management
A Quick Note about In Real Life Digital concepts can get confusing for a lot…
How to Connect an AWS API Gateway to a Private VPC Using an ALB
AWS and API Gateway The AWS ecosystem provides developers and system administrators with many tools…
Keycloak High Availability in Cloud environment (AWS) - PART 4/4
All the configuration presented in the previous parts have been settled according to our simulation…
Keycloak High Availability in Cloud environment (AWS) - PART 3/4
In previous part, we have explained our context and how to configure our infrastructure and…
Securing your APIs using Okta and a JHipster gateway
A step by step guide on setting up a JHipster application with Okta that provides first class support for system users.…
Keycloak High Availability in Cloud environment (AWS) - PART 2/4
In the previous first part, we have described the main cloud architecture, according to the…
Keycloak High Availability in Cloud environment (AWS) - PART 1/4
For those who do not already know the Keycloak product, it is the main IAM…
AWS Cognito and JHipster for the LOVE of OAuth 2.0
OAuth 2.0 is a stateful security mechanism. OpenID Connect (OIDC) is an authentication layer…
Integrating Civic into a Static Serverless Website (part 2 of 2)
This is the second part of this tutorial (first part here). By now your static…
Integrating Civic into a Static Serverless Website Part 1 of 2
This article describes an application that takes advantage of AWS serverless services to provide a…
Service Oriented Network Security - AWS Security Group Design
Amazon Web Services is capable of providing the infrastructure to run all of your applications…
JHipster: Streamlining the Hackathon Experience
For most 24 hour Hackathons, the work starts a week or two prior to the…
Security White Paper: OWASP - Building Secure Web Applications
Nowadays, software application security absolutely cannot be ignored and every IT professional must take this…
OWASP Top 10 - A10 Unvalidated Redirects and Forwards
Description If a user is redirected or forwarded to a page defined by an unverified…
OWASP Top 10 - A9 Using Components with Known Vulnerabilities
Description Known software vulnerabilities are available to everyone on the Internet. If an attacker knows…