I am a Technology Entrepreneur with a software development background. Currently, I am focused on solving the technology issues that many companies face for login, registration, and user management. My team and I built FusionAuth: A modern customer identity and access management (CIAM) platform that comes with features not seen in the marketplace today. It allows companies to focus on their core product not the plumbing of identity and user management.
This talk discusses the progression from a monolithic application, where the application and user data are in the same database, to a microservice architecture, where the application and user data are in separate databases.
It covers the history behind sessions and some of the issues with them. It then builds on this by introducing tokens to manage identity and finally ends with a complete discussion of JSON Web Tokens (JWTs) and OpenID Connect. I cover JWTs, how we use OpenID Connect, and the benefits and drawbacks of these systems.
This talk discusses the progression from a monolithic application, where the application and user data are in the same database, to a microservice architecture, where the application and user data are in separate databases.
It covers the history behind sessions and some of the issues with them. It then builds on this by introducing tokens to manage identity and finally ends with a complete discussion of JSON Web Tokens (JWTs). I cover what JWTs are, how they are used, the benefits and some of the issues with them.
This talk covers security at each level: server, database, and application. I cover how to secure a Linux server, secure the database, and finally to secure the application.
This presentation is a step-by-step guide that includes two-factor authentication, SSH security, intrusion detection, permissions, sockets, proxies, grants, password encryption, entropy, SQL injection, and social hacking.
As your organization changes from a monolithic architecture to microservices, or you are looking at what this type of change requires, a key component to consider is identity and user management.
This talk will discuss the progression from monolithic identity to microservice based identity. You’ll learn about techniques to make the switch less painful and pitfalls to watch out for during the process.
Are you considering a switch to microservices and trying to determine the benefits and tradeoffs?
This talk will cover the core tenants of a microservice architecture and how they can help guide you through the decision making process. You’ll uncover the reasons why sometimes microservices aren’t the right solution and when they will truly save you time and money. We’ll also cover core components of a microservice architecture that need to be implemented early in the process including storage, identity, security, scaling and more.