Joshua CaseyK8s mTLS Auth with TLS PassthroughIt’s well known that the default way to authenticate with a Kubernetes cluster uses mTLS to authenticate an API call.Jun 22, 20231Jun 22, 20231
Joshua CaseyPresenting an easy OIDC CLIFind yourself in need of a CLI to retrieve an id_token? Or perhaps you just want to quickly check whether a client is configured correctly…Nov 15, 2022Nov 15, 2022
Joshua CaseyHow to browse the web (a little) more securelyOver the past few years I’ve accumulated a few tips and tricks to keep my browsing private. Quite a few parties may have access to your…Mar 18, 2022Mar 18, 2022
Joshua CaseyHow to connect Okta SAML and Spring Boot using saml2Login, part 2This is the second article in the series. For the first article, visit here.Dec 29, 2020Dec 29, 2020
Joshua CaseyPassword-Hashing-As-A-ServicePHAAS? What acronyms you get when everything is as a serviceDec 3, 20201Dec 3, 20201
Joshua CaseyExtension Points in KubernetesUse Case: I want to prevent creation of a resource that does not meet standard.Dec 2, 2020Dec 2, 2020
Joshua CaseyHow to connect Okta SAML and Spring Boot using saml2Login, part 1If you have a Spring Boot app, chances are you want to allow users to easily login to that app. Here I’ll show you how to use Okta as a…Oct 29, 2020Oct 29, 2020
Joshua CaseyLeadership lessons from the homeDuring the past few months I’ve been fortunate to spend a good deal of time with my family. I’ve noticed a few patterns with the kids —…Sep 12, 2020Sep 12, 2020
Joshua CaseyHow to verify UAA Tokens, part 2 — “Offline Validation”In part 1 [1] I discussed a strategy that we call “online validation” of tokens, by calling the UAA’s /introspect [2] endpoint and passing…Apr 18, 20201Apr 18, 20201