Articles

Lead Image © lassedesignen, 123RF.com

Lead Image © lassedesignen, 123RF.com

Secure authentication with FIDO2

The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
Lead Image © Chatree Jaiyangyuen, 123rf.com

Lead Image © Chatree Jaiyangyuen, 123rf.com

Identity and access management with OpenIAM

Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.
Lead Image © Maxim Borovkov, 123RF.com

Lead Image © Maxim Borovkov, 123RF.com

New features in PHP 8

After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features
Lead Image © it studiom1, 123RF.com

Lead Image © it studiom1, 123RF.com

Building sustainably safe containers

The basic container images on which you base your work can often be out of date. We show you how to solve this problem and create significantly leaner containers.
Photo by Mark Decile on Unsplash

Photo by Mark Decile on Unsplash

Processing streaming events with Apache Kafka

Apache Kafka reads and writes events virtually in real time, and you can extend it to take on a wide range of roles in today's world of big data and event streaming.
Lead Image © bowie15, 123RF

Lead Image © bowie15, 123RF

Real-time log inspection

Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.
Lead Image © Kirsty Pargeter, 123RF.com

Lead Image © Kirsty Pargeter, 123RF.com

Single sign-on with Keycloak

Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.
Lead Image © Michael Kempf, Fotolia.com

Lead Image © Michael Kempf, Fotolia.com

Automate CentOS and RHEL installation with PXE

Red Hat delivers an installer that lets you automate the installation of RHEL and CentOS in a preboot execution environment.
Lead Image © Danila Krylov, 123RF.com

Lead Image © Danila Krylov, 123RF.com

HTML to database with a Perl script

A Perl script strips HTML markup, creating text files, and makes each file an entry in a database.
Lead Image © Marcel Goldbach, photocase.com

Lead Image © Marcel Goldbach, photocase.com

Managing access credentials

Most Internet services require password-protected individual accounts. A password manager can help you keep track of all your access credentials.