// Topic
Authentication
Definition
Authentication coverage in this archive spans 3 posts from Dec 2016 to Apr 2022 and frames authentication as continuous risk reduction instead of one-time policy work. The strongest adjacent threads are security, oauth, and authorization. Recurring title motifs include securing, oauth, tokens, and they.
What the archive argues
- The strongest pattern is operational: security controls are effective only when they are embedded in delivery flow.
- The consistent theme from 2016 to 2022 is disciplined execution over hype cycles.
- This topic repeatedly intersects with security, oauth, and authorization, so design choices here rarely stand alone.
Execution checklist
- Map threats to concrete controls, then tie each control to an owner and an observable signal.
- Start with the newest post to calibrate current constraints, then backtrack to older entries for first principles.
- When boundary questions appear, cross-read security and oauth before committing implementation details.
Common failure modes
- Treating compliance checklists as a substitute for runtime detection and response.
- Adding controls no one owns, tests, or rehearses under incident pressure.
- Applying guidance from 2016 to 2022 without revisiting assumptions as context changed.
Suggested reading path
- Start here (current state): OAuth Tokens: Why They Keep Getting Stolen and How to Stop It
- Then read (operating middle): Securing Microservices: What Actually Works
- Finish with (foundational context): Securing APIs: Authentication and Authorization Patterns
Related posts
- OAuth Tokens: Why They Keep Getting Stolen and How to Stop It
- Securing Microservices: What Actually Works
- Securing APIs: Authentication and Authorization Patterns
References
3 posts
- OAuth Tokens: Why They Keep Getting Stolen and How to Stop It
Bearer tokens are bearer weapons. Short lifetimes, tight scopes, encrypted storage, and real monitoring are the only defenses that matter.
Securing Microservices: What Actually Works
You split the monolith. Now every service-to-service call is an attack surface. Here's how I think about identity, authorization, encryption, and secrets management in distributed systems.
Securing APIs: Authentication and Authorization Patterns
APIs expose your systems to the world. Here's how to implement authentication and authorization that protects your data without frustrating legitimate users.