// Topic
Authorization
2 posts
- Securing Microservices: What Actually Works
You split the monolith. Now every service-to-service call is an attack surface. Here's how I think about identity, authorization, encryption, and secrets management in distributed systems.
Securing APIs: Authentication and Authorization Patterns
APIs expose your systems to the world. Here's how to implement authentication and authorization that protects your data without frustrating legitimate users.