How Can You Prove Your Digital You is You?

George Bernard Shaw was witty and fun.  He was famous for being quotable – very much like Oscar Wilde.  One of the quotes I love, and I thought was perfect for this blog: “The single biggest problem in communication is the illusion that it has taken place.” In the real world, communication is an illusion.  People talk but they don’t listen. …

Applying and Extending DHARMA

This post gives some practical examples of the DHARMA method for API Security in a Microservice Architecture, and also shares some opportunities for extending the model. This article shares concepts from the O’Reilly book Securing Microservice APIs. If you’re attending OSCON next week, Rob Wilson and Matt McLarty will be signing and giving away print copies during lunch…

Securing Microservice APIs

Matt McLarty, Rob Wilson & Scott Morrison Sustainable and Scalable Access Control There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multiple…

A Microservices Primer

The technical definition is….microservices are design patterns to turn complex applications into simple, fine-grained, reusable, and interoperable processes that can be modified and deployed independently of each other. Ok, a bit heavy…so let’s translate that, using some mental visuals.  Imagine you’re 30 years in the future and you have a great family home, Jetson’s style…

Implementing Microservices

I recently wrote about what microservices were, and why they are becoming so important.  In this discussion, we’ll talk about implementing microservices, as well as touch on APIs and API Management – turns out they are crucial to a microservice architecture. Just a quick note – while you may see microservice and microservice architecture used…