Forem

# identity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Task Queues Are Like a Jenga Tower

Task Queues Are Like a Jenga Tower

Comments
4 min read
Identity-First Security Strategy

Identity-First Security Strategy

1
Comments
4 min read
How we built identity verification for contractors: GPS scoring, revolving QR, and Google Wallet passes
Cover image for How we built identity verification for contractors: GPS scoring, revolving QR, and Google Wallet passes

How we built identity verification for contractors: GPS scoring, revolving QR, and Google Wallet passes

1
Comments
5 min read
Why I Built an Identity Provider in Go and SQLite

Why I Built an Identity Provider in Go and SQLite

5
Comments
4 min read
How Teleport Works: A Deep Dive into Modern Infrastructure Access
Cover image for How Teleport Works: A Deep Dive into Modern Infrastructure Access

How Teleport Works: A Deep Dive into Modern Infrastructure Access

2
Comments
32 min read
WIMSE (Workload Identity in Multi System Environments) Deep Dive: Standardizing Identity Authentication for Microservices
Cover image for WIMSE (Workload Identity in Multi System Environments) Deep Dive: Standardizing Identity Authentication for Microservices

WIMSE (Workload Identity in Multi System Environments) Deep Dive: Standardizing Identity Authentication for Microservices

3
Comments
11 min read
On‑Chain Identity As The Glue (After 45 Days, Identity Looks Different)
Cover image for On‑Chain Identity As The Glue (After 45 Days, Identity Looks Different)

On‑Chain Identity As The Glue (After 45 Days, Identity Looks Different)

Comments
9 min read
Character in the Rust
Cover image for Character in the Rust

Character in the Rust

Comments
4 min read
Paper: The Forgetting Problem — Why Perfect Memory Breaks AI Agent Identity

Paper: The Forgetting Problem — Why Perfect Memory Breaks AI Agent Identity

2
Comments 2
3 min read
The First Password Breach Wasn’t a Hacker — It Was OperationsQuestion for IAM/PAM folks:
Cover image for The First Password Breach Wasn’t a Hacker — It Was OperationsQuestion for IAM/PAM folks:

The First Password Breach Wasn’t a Hacker — It Was OperationsQuestion for IAM/PAM folks:

Comments 1
1 min read
My Experience: Managed identities implementation
Cover image for My Experience: Managed identities implementation

My Experience: Managed identities implementation

1
Comments
2 min read
My Experience: Azure Key Vault patterns
Cover image for My Experience: Azure Key Vault patterns

My Experience: Azure Key Vault patterns

1
Comments
2 min read
Your SaaS Apps Are the New Active Directory And Nobody Is Governing Them

Your SaaS Apps Are the New Active Directory And Nobody Is Governing Them

Comments
3 min read
Common FAPI Misconceptions
Cover image for Common FAPI Misconceptions

Common FAPI Misconceptions

9
Comments
4 min read
How a corruption-convicted company broke Chile's national ID system — and walked away with $480M
Cover image for How a corruption-convicted company broke Chile's national ID system — and walked away with $480M

How a corruption-convicted company broke Chile's national ID system — and walked away with $480M

3
Comments 1
15 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.