Open in app

Sign In

Write

Sign In

Pushpalanka Jayawardhana
Pushpalanka Jayawardhana

161 Followers

Home

About

Pinned

Evolving Landscape of Authorisation

Access Control domain is a hot topic again with different fronts of innovations happening. These advancements are promising and seems paving the way to take this domain to the next level. …

Authorization

4 min read

Evolving Landscape of Authorisation
Evolving Landscape of Authorisation
Authorization

4 min read


Pinned

Prominent Identity Protocols

Authentication Protocols LDAP(Lightweight Directory Access Protocol) For years most of the enterprises have been maintaining their own LDAP based user store to store user details along with username and password. Directly calling this storage and validating the password against stored one caters for basic authentication. With the cloud services availability and popular…

Authentication

4 min read

Authentication

4 min read


Pinned

JVM Garbage Collection and Optimizations

Overview When troubleshooting systems for performance-related issues, memory optimizations are a place that needs a deep analysis of what each system stores in the memory, how long those are stored, and access patterns. …

JVM

9 min read

JVM Garbage Collection and Optimizations
JVM Garbage Collection and Optimizations
JVM

9 min read


Pinned

My Reading on Google Zanzibar: Consistent, Global Authorization System

Just to capture my thoughts on Google Zanzibar based on the published research paper at https://storage.googleapis.com/pub-tools-public-publication-data/pdf/41f08f03da59f5518802898f68730e247e23c331.pdf Scale of Zanzibar and realizing it acts as the central access control system for 100s of Google services itself earned lot of respect as I just started. Since it’s shared by many different services…

Authorization

6 min read

My Reading on Google Zanzibar: Consistent, Global Authorization System
My Reading on Google Zanzibar: Consistent, Global Authorization System
Authorization

6 min read


Pinned

SAML vs OAuth

SAML — Security Assertion Markup Language OAuth — Open Authorization If you have some understanding on SAML and OAuth, you may have found it an incomparable battle. Yes, though both SAML and OAuth deal with Identity and Access Management(IAM) they focus on different aspects. …

Oidc

6 min read

SAML vs OAuth
SAML vs OAuth
Oidc

6 min read


Nov 13, 2022

Cache, the demanding friend

This post is to keep a summarised note on different caching approaches as applicable for a distributed monolithic application in general, as explored based on Keycloak 11.0.3 server. Having a cache can help greatly in reducing the response times and reducing the load on the database, based on cache hit…

Cache Control

4 min read

Cache, the demanding friend
Cache, the demanding friend
Cache Control

4 min read


Sep 4, 2022

Scalable, Reviewable & Maintainable Solution to Customize Email Templates in Okta

Recently we had an interesting requirement to be catered in our Okta based IAM system which I briefly describe below. Requirement: We wanted to brand and customize the content of all the emails going out from our Okta tenant. This is about 10 email templates(forgot password, setup security method, password changed…

Okta

5 min read

Scalable, Reviewable & Maintainable Solution to Customize Email Templates in Okta
Scalable, Reviewable & Maintainable Solution to Customize Email Templates in Okta
Okta

5 min read


Oct 26, 2021

Google One Tap without loosing sight of your users

User authentication is an ever-evolving aspect which has gone through rapid revamps along the path, from basic authentication, multi-factor, social, bio-metric and password-less. Finding the right balance between security aspects and seamless user experience has driven advancements in this regards. I would name Google One Tap(GOT) as one such effort…

Google One Tap

6 min read

Google One Tap without loosing sight of your users
Google One Tap without loosing sight of your users
Google One Tap

6 min read


Apr 28, 2020

Tomcat JDBC Pool — Connection Leaks — Catch the Culprit

Database connection leaks are something that can stay hidden unless paid specific attention and would come to the surface at the most critical stages at a peak time of the system. We would manually check if all the open connections have been closed properly. Then we have various code quality…

Pool

3 min read

Pool

3 min read


Jan 30, 2019

OPA for HTTP Authorization

Open Policy Agent[1] is a promising, lightweight and very generic policy engine to govern authorization is any type of domain. …

API

4 min read

API

4 min read

Pushpalanka Jayawardhana

Pushpalanka Jayawardhana

161 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech