Security

secure coding
Article

Biometric authentication with WebAuthn and SSO

Philip Hayes

Improve security by using biometric data for user authentication. Configure Red Hat SSO to use WebAuthn and deploy test client for biometric authentication.

Featured image for GitOps + Kubernetes
Article

Checkpoint and restore in Kubernetes

Adrian Reber

Checkpoint/restore is useful when migrating containers in Kubernetes. Learn how this feature was implemented and how it's used in container migrations.

Quarkus + data grid
Article

How to connect to Red Hat Data Grid without SSL

Varsha Sharma

Learn how to connect to Red Hat Data Grid without using SSL. This service uses single sign-on tech (SSO) without SSL when you don't require secure connectivity.

Featured image for secure coding.
Article

Simplify API security with Authorino

Guilherme Cassolato

Secure open source, cloud-native APIs with Authorino. This external authorization service lets you configure it quickly via the Kubernetes API for flexible use.

Enhance application security by rotating 3scale access tokens
Article

4 steps to set up 3scale access tokens

Samuele Illuminati +1

Learn how to set up single-use access tokens in Red Hat 3scale API Management to enhance application security with this X-step demo.