[Webinar] Ditch Static Credentials: Embrace WIF for Enhanced Security | Nov 6 at 11 a.m. PT | Register Now

Aembit Earns Prestigious Runner-Up Spot at RSA Innovation Sandbox Contest! Watch the Announcement

Category: Industry Insights

OAuth 2.0 has emerged as a de facto standard for secure authentication. Here is a step-by-step tutorial for configuring it to Google BigQuery.
Read how our engineers debugged a perplexing connection issue in Aembit Edge, highlighting key asynchronous DNS challenges to Linux kernel race conditions.
This article briefly describes SPIFFE and SPIRE and explains how Aembit differs from them.
This article describes how to use Terraform to configure AWS to periodically start an EC2 instance.
TLS for Postgres is different than for web browsers and HTTP. This article describes issues we encountered developing Aembit's support for Postgres TLS.
This article is a brief overview of some challenges with IaC. It's not a complete guide to IaC, but it will give you an idea of what to watch out for.
Workload Identity and Access Management basically means that you need to make sure authorized apps on one side of a request can access apps on the other.
This article will help you understand how to authenticate a workload with the Microsoft Graph REST API using the OAuth 2.0 Client Credentials flow.
Choosing a programming language for a new project is a rigid architectural decision. This article discusses why we chose Rust for Aembit's Agent/Proxy.
How we use Docker Compose and Kubernetes to rapidly accelerate development workflows.