Главная
Study mode:
on
1
Intro
2
The Red Team Exercise
3
Authentication and Authorization
4
Fix #1: Forwardable Bearer Credentials
5
Potential Fix: Credential Scopes
6
Keeping up with scopes
7
Service-to-Service (S2S) Access Control
8
Service-to-Service Pitfalls
9
End-User Context (EUC) Tickets
10
The Authorizable Context Abstraction
11
Three Takeaways
Description:
Explore the challenges and solutions in implementing authentication and authorization for zero-trust architectures in microservice ecosystems. Dive into Netflix's journey of creating a robust security system, examining the requirements, technology choices, and hurdles encountered. Learn about the surprising decision to use multiple technologies instead of a single solution. Discover insights on forwardable bearer credentials, credential scopes, service-to-service access control, end-user context tickets, and the authorizable context abstraction. Gain valuable takeaways from this 21-minute USENIX Enigma Conference talk by Ian Haken, offering practical knowledge for enhancing security in complex distributed systems.

Adventures in Authentication and Authorization

USENIX Enigma Conference
Add to list
0:00 / 0:00