2025-11-27
If your business works with users from Russia, the question of where personal data is stored concerns you directly. Phones, names, email addresses, form submissions, employee data — all of this falls under strict …
Read more2025-11-21
Moving to the cloud or changing providers is always open-heart surgery. An engineer has to solve a lot of issues: how to move terabytes of data with minimal downtime? How to convert the schema? How to set up CDC (Change …
Read more2025-11-20
You deployed a new feature. Everything works perfectly on your local machine, and you’re happy with the result.
Then a message appears: “Nothing works for me.” You open the server logs — they’re …
Read more2025-09-03
Swap is virtual memory on disk that saves your VPS from crashing when RAM runs out. On low-cost servers, it’s an indispensable tool to avoid failures during short-term memory usage spikes. Setup is simple: create a file, …
Read more2025-09-01
AWS Cognito and Microsoft Entra ID: Authentication as Part of the Ecosystem Introduction If Auth0 is the “hired expert” for authentication, then AWS Cognito and Microsoft Entra ID are the “system …
Read more2025-08-31
Auth0: Authentication as a Service, or “Just Pay” Introduction So far, we’ve discussed solutions that give you full control but demand effort. Auth0 offers a different path: outsourcing authentication …
Read more2025-08-30
FreeIPA: The Untamed Titan of Enterprise Identity Introduction While Keycloak and FusionAuth focus on the web, FreeIPA operates on a different level. It’s not just an authentication server. It’s an integrated solution …
Read more2025-08-29
FusionAuth: Challenging the Giants with an API Focus Introduction While Keycloak may feel like a heavyweight titan built for the enterprise world, FusionAuth enters the arena with a much more developer-friendly agenda. …
Read more2025-08-28
Keycloak: Open Source and Big Ambitions Introduction In a world where more and more services outsource user management, Keycloak offers a different path. This project is not just a set of login APIs. It is a …
Read more2025-08-27
The Problem with Certificates at Scale In previous articles, we discussed that OpenVPN uses certificates for authentication. This method is reliable but has significant drawbacks:
Inconvenience for users: Each user must …
Read more