Caching is difficult to get right and often means you need to pull in additional frameworks into your...
I had the benefit of joining the AWS Community Day in Zürich this week, most went as expected but,...
The Blog Post Release Automation I made this mistake this week of believing I wanted to...
What is user impersonation? User impersonation is anything that allows your systems to...
One day you might find yourself in the unfortunate position of wanting to migrate away from...
This article is a rebuttal to Truffle Security's post on Millions of Accounts Vulnerable due to...
$78,641.25 Per Month. That's the predicted amount of running the official quota monitor...
It shouldn't be any surprise that we rely on DynamoDB over at Authress for a variety of things. For...
Authors: Warren Parad, Eduardo Santana We made this decision because we believe that your use case...
Secrets and credentials are everywhere, we use them to access third party systems. At Authress we...
Machine to machine auth is how you ensure secure communication between individual services, and each...
(Note, this article continues from Part 1: AWS Metrics: Advanced) We can't use...
Normally I'm the last proponent of collecting metrics. The reason is: metrics don't tell you...
Should I put my service in the private subnet or the public one? This age old question has...
Often I've come across what can only be describe as a Beg-Ad. That's: I built something, please,...
I'm going to tell you a story, one that may even have happened to you. The sad truth is this a very...
This article is part of the Authress Academy and discusses the different ways to invalidate a user's...
Having built many Product APIs in my experience for multiple companies, there are a number of Myths...
How to think about testing, which tests you need, and when to write the right test.
Before we get into how to handle a breaking change, we should first identify what is even a breaking...
It should be a inevitable conclusion that you to need to measure the success of your teams. After...
The required team meetings There is no shortage of advice out there on knowing when to...
An obvious story you might decide to tell yourself is Logging is easy. And writing to the console or...
Step up authorization is the process of converting a user’s auth from a base level to an elevated or...
It’s pretty common in monolith architectures to have to handle migrations. But this isn’t the only...
You're building out a SaaS solution and realize for one reason or another supporting custom domains...
AWS Cognito is AWS auth solution, it’s much better than Azure’s and many others that think Auth is...
Making changes to your DNS and it still doesn't work, here's a troubleshooting guide
The optimized step function This is the advanced guide to using AWS Step Functions. Step functions...