Ege Aytin

Ege Aytin @egeaytin

About: Product person and software enthusiast. Loves golang & javascript, open-sourcer. Writes about tech, mostly authorization.

Location:
San Francisco, CA
Joined:
Sep 8, 2022

Ege Aytin
articles - 35 total

What is SCIM Provisioning: In-Depth Guide [2024]

The ability to outsource and automate repetitive daily tasks is at the core of why SCIM provisioning...

Learn More 24 1Oct 29 '24

OAuth vs. JWT: Ultimate Comparison

One of the most critical decisions in a software development project is selecting security standards....

Learn More 39 4Jul 25 '24

How To Build Centralized Authorization System

In a centralized authorization, control decisions are managed from one single location and serve the...

Learn More 15 0Jul 24 '24

Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

Due to the presence of tools like kubernetes, it is easier to manage and automate the daily working...

Learn More 13 1Jul 4 '24

How to Implement Two-Factor Authentication (2FA) in Golang

Authentication is crucial for ensuring security and passwords alone are no longer sufficient to...

Learn More 17 0Jul 1 '24

Fine-Grained Access Control (FGAC): Comprehensive Guidance

Securing who can access what under which conditions,also known as authorization, is a crucial part of...

Learn More 16 0Jun 12 '24

Implementing Role Based Access Control (RBAC) in Node.js and Express App

To ensure that only authorized users can access specific features and data within an application,...

Learn More 21 1Jun 5 '24

Implementing Role Based Access Control in SvelteKit

Table Of Contents Understanding Role-Based Access Control (RBAC) Setting Up the SvelteKit...

Learn More 28 0May 30 '24

JWT vs PASETO: New Era of Token-Based Authentication

Table Of Contents How Does Token-Based Authentication Work? What is JWT? How JWT...

Learn More 9 0May 22 '24

Consistent Hashing: An Overview and Implementation in Golang

Table Of Contents What Is Hashing? What Is Consistent Hashing? What Problem Does...

Learn More 13 0May 7 '24

How to Add Firebase Authentication To Your NodeJS App

Security is an absolute must for any application, whether you are building a simple pet project or a...

Learn More 12 0May 1 '24

Policy-Based Access Control (PBAC): A Comprehensive Overview

Broken access control, privilege creep and role explosion put all organizations at risk. Long gone...

Learn More 10 1Apr 16 '24

Building Scalable GraphQL Microservices With Node.js and Docker: A Comprehensive Guide

In this guide, we will explore the step-by-step process of building scalable GraphQL microservices...

Learn More 27 0Apr 10 '24

OAuth 2.0 implementation in Node.js

Today, so many applications' functionality requires accessing resources hosted on other applications...

Learn More 18 0Mar 13 '24

Microservices Authentication and Authorization Using API Gateway

In today's complex microservices architecture, ensuring robust authentication and authorization is a...

Learn More 60 3Feb 27 '24

Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

When an enterprise user base grows, managing user permissions and access rights becomes complex and...

Learn More 10 0Feb 21 '24

Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

In contrast to other approaches like Relationship-Based Access Control (ReBAC) and Role-Based Access...

Learn More 18 0Feb 7 '24

Implementing JWT Authentication in a Golang Application

In this tutorial, we'll explore the fundamentals of JWT authentication, understanding its...

Learn More 22 0Jan 30 '24

Relationship Based Access Control (ReBAC): When To Use It

Relationship Based Access Control (ReBAC) has gained its popularity over years among startups to...

Learn More 7 0Jan 18 '24

Authentication vs Authorization: Exploring The Difference

The widespread accessibility of applications introduces a significant security challenge - the risk...

Learn More 10 0Dec 12 '23

OPA vs. Google Zanzibar: A Brief Comparison

Introduction Authorization is a crucial aspect of any modern software system, governing...

Learn More 13 0Nov 14 '23

Implementing Role-Based Access Control in Django

Author: Boluwatife Fayemi Introduction Access control is an important component in every...

Learn More 16 0Nov 1 '23

WebAssembly with Go: Taking Web Apps to the Next Level

Author: Tolga Ozen Introduction You might've noticed the increasing chatter around...

Learn More 17 0Oct 17 '23

Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

Today, we are thrilled to announce the launch of our Attribute-Based Access Control (ABAC) feature....

Learn More 11 0Aug 28 '23

Modeling Google Docs Access Management Using Permify

Introduction Welcome to our in-depth exploration of the Google Docs authorization model....

Learn More 1 0Aug 17 '23

Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

Introduction In today's interconnected and data-driven world, organizations face...

Learn More 2 0Jul 10 '23

Modeling Facebook Groups Access Management

Introduction We frequently receive inquiries about how to model different types of...

Learn More 14 0Jun 17 '23

Exploring Google Zanzibar: A Demonstration of Its Basics

Welcome to our latest article on Google Zanzibar! For those who haven't heard of it yet, Zanzibar is...

Learn More 40 2Apr 6 '23

Cookie Management in ExpressJS to Authenticate Users

Express.js is a widely used NodeJs framework by far and if you’re familiar with it, probably cookie...

Learn More 7 2Feb 26 '23

Build a Team permissions system in Node.js app using Auth0 and Permify - Part 2

This is Part 2 in the series of guides on building a team permission system in Node.js app using...

Learn More 10 2Jan 31 '23