The most common access control method that allows access to a website’s public area is Anonymous access. It allows a user to access a website’s public space without providing a user id and password. Similarly, anonymous authentication allows users to access APIs without having to provide any means of authentication. Public websites use anonymous authentication to call the backend APIs to gather dynamic content to serve their user base.
As far as consuming APIs is concerned, there are three means of authentication.
What is SOC2?
Two-thirds of the Earth’s surface is covered with water. The other third is covered with auditors from headquarters — Ralph Norman Augustine
Service Organization Control 2(SOC 2), pronounced as sock two, is an auditing procedure that ensures that service providers securely manage your data to protect your organization’s interests and the privacy of its clients. SOC 2 compliance is a minimal requirement for security-conscious businesses when considering a SaaS provider and is industry agnostic. SOC 2 is ubiquitous in the B2B space and provides information security and privacy assurance to 3rd party providers. The majority of companies…
I mount my soul at /dev/null
Globbing patterns or pathname expansions are commonly referred to as wildcards in a *nix based operating system. The presence of one of the characters ‘?’, ‘*’ or ‘[‘ in a string is referred to as a wildcard pattern. Pathname expansions expand the ‘*’, ‘.’ or the ‘?’. The operation that expands said wildcard pattern into a list of pathnames is called Globbing. We use this almost every day without realizing it. For example,
When using wildcards, one needs to remember the following.
Docker is the de facto standard among container platforms. Like any software system, developers are proactively working to improve Dockers’ usage and performance. As a result , the commands are always evolving, leading to more efficient commands or deprecations. There are numerous articles about the topmost Docker commands that programmers should know. In this article, I present to you three of them that every operations engineer utilizing Docker should know.
The events differ based on the Docker object type. There are two types of Docker events — local scoped and swarm scoped. Solely on the node that the event takes…
This is the second of a series of articles that acts a complete guide on how to start your containerization journey using Docker. To read the first, please visit the following link.
The de facto standard for building containers and containerized applications is Docker. Since Docker’s inception, there have been a ton of articles about Docker, its architecture, and the differences between Docker and virtual machines. Even though these articles educate developers on the underlying architecture, they don’t leave the engineer well versed in using Docker efficiently. This article and the next few are an effort to provide less about the underlying architecture and more hands-on Docker.
In today’s world, there are ample solutions for a database. The easiest one to install and use is PostgreSQL. This article walks you through installing PostgreSQL on a MacbookPro, creating a user, database and, granting privileges to the freshly created user. Later we will create a schema and add an example table to this schema.
The easiest way to install PostgreSQL is to download the DMG from postgres.org. Another way is to install is using homebrew. I use homebrew to manage most of my software. Just run the following command.
prompt>> brew install postgres .... To have launchd start postgresql…
Almost in motion, the Future is!