K8s mTLS Auth with TLS PassthroughIt’s well known that the default way to authenticate with a Kubernetes cluster uses mTLS to authenticate an API call.Jun 22, 20231Jun 22, 20231
Presenting an easy OIDC CLIFind yourself in need of a CLI to retrieve an id_token? Or perhaps you just want to quickly check whether a client is configured correctly…Nov 15, 2022Nov 15, 2022
How to browse the web (a little) more securelyOver the past few years I’ve accumulated a few tips and tricks to keep my browsing private. Quite a few parties may have access to your…Mar 18, 2022Mar 18, 2022
How to connect Okta SAML and Spring Boot using saml2Login, part 2This is the second article in the series. For the first article, visit here.Dec 29, 2020Dec 29, 2020
Password-Hashing-As-A-ServicePHAAS? What acronyms you get when everything is as a serviceDec 3, 20201Dec 3, 20201
Extension Points in KubernetesUse Case: I want to prevent creation of a resource that does not meet standard.Dec 2, 2020Dec 2, 2020
How to connect Okta SAML and Spring Boot using saml2Login, part 1If you have a Spring Boot app, chances are you want to allow users to easily login to that app. Here I’ll show you how to use Okta as a…Oct 29, 2020Oct 29, 2020
Leadership lessons from the homeDuring the past few months I’ve been fortunate to spend a good deal of time with my family. I’ve noticed a few patterns with the kids —…Sep 12, 2020Sep 12, 2020
How to verify UAA Tokens, part 2 — “Offline Validation”In part 1 [1] I discussed a strategy that we call “online validation” of tokens, by calling the UAA’s /introspect [2] endpoint and passing…Apr 18, 20201Apr 18, 20201