Folgen

  • Preview: Identity-Native Infrastructure Access Management
    Dec 9 2022
    Early Release. Raw & Unedited. Chapter 1.
    Mehr anzeigen Weniger anzeigen
    38 Min.
  • Setting Up an SSH Bastion Host
    May 24 2022
    What is an SSH bastion and how is this different from an SSH jump server or an SSH proxy? In this post, we’ll answer this question and will show you how to set it up using two popular open source projects. OpenSSH is the older and better known SSH server. It comes pre-installed by default with the vast majority of Linux distributions and is the easier option to get started with. Teleport is a much newer SSH server, its first production-quality release came out in 2016. Teleport has been optimized for elastic multi-cloud environments and supports other access protocols in addition to SSH.
    Mehr anzeigen Weniger anzeigen
    10 Min.
  • SSH Best Practices using Certificates, 2FA and Bastions
    May 24 2022
    The industry best practices for SSH security include using certificates, two-factor authentication, and SSH bastion hosts. Below, we practically explain how to implement these best practices in detail using working sample commands and configurations with OpenSSH users in mind.
    Mehr anzeigen Weniger anzeigen
    23 Min.
  • Troubleshooting Kubernetes Networking Issues
    Feb 3 2022
    This is the first of a series of blog posts on the most common failures we’ve encountered with Kubernetes across a variety of deployments. In this first part of this series, we will focus on networking. We will list the issue we have encountered, include easy ways to troubleshoot/discover it and offer some advice on how to avoid the failures and achieve more robust deployments. Finally, we will list some of the tools that we have found helpful when troubleshooting.
    Mehr anzeigen Weniger anzeigen
    9 Min.
  • Anatomy of a Cloud Infrastructure Attack via a Pull Request
    Feb 2 2022
    In April 2021, I discovered an attack vector that could allow a malicious Pull Request to a Github repository to gain access to our production environment. Open source companies like us, or anyone else who accepts external contributions, are especially vulnerable to this. https://goteleport.com/blog/hack-via-pull-request/
    Mehr anzeigen Weniger anzeigen
    12 Min.
  • How SAML 2.0 Authentication Works?
    Jan 18 2022
    What is SAML 2.0? Security Assertion Markup Language (SAML) 2.0 is one of the most widely used open standard for authentication and authorizing between multiple parties. It’s one of the protocol that give users the single sign-on (SSO) experience for applications. The other adopted open standard is OAuth and OpenID. Of the two, SAML 2.0, released in 2005, remains the 800 pound gorilla in Enterprise SSO space. This post provides a detailed introduction on how SAML works
    Mehr anzeigen Weniger anzeigen
    17 Min.
  • How to Set Up an SSH Jump Server
    Jan 18 2022
    In this blog post we’ll cover how to set up an SSH jump server. We’ll cover two open source projects. A traditional SSH jump server using OpenSSH. The advantage of this method is that your servers already have OpenSSH pre-installed. A modern approach using Teleport, a newer open source alternative to OpenSSH. Both of these servers are easy to install and configure, are free and open-source, and are single-binary Linux daemons.
    Mehr anzeigen Weniger anzeigen
    9 Min.
  • How OIDC Authentication Works
    Jan 18 2022
    In this article, we will explore this same conundrum for our online identities in the form of the authentication layer, OIDC, built on the authorization protocol, OAuth.
    Mehr anzeigen Weniger anzeigen
    23 Min.