Tag: authorization

Process massive volumes of real-time data updates and serve high volumes of queries.

EnvoyProxy 5: Authorized Access with JWT

Abstract The purpose of this article is to explain how to use technologies is to validate that users are who they claim to be (authentication) and to determine what resources that user has permission to access (authorization). This is done by expanding upon the protections against man-in-the-middle and eavesdropping attacks that are obtained with the…
Read more