SlideShare a Scribd company logo
@davib0
Authentication in Microservice Systems
David Borsos
@davib0
Authentication and Authorisation in
Microservice Systems
David Borsos
@davib0
Authentication and Authorisation in
Microservice Systems
David Borsos
@davib0
End-user
Authentication and Authorisation in
Microservice Systems
David Borsos
@davib0
Introduction
David Borsos
Joined OpenCredo in 2013
Working on microservices since then
Email: david.borsos@opencredo.com
Twitter: @davib0
http://www.opencredo.com
@davib0
Why?
@davib0
Traditional “monolithic” architecture
@davib0
Traditional “monolithic” architecture
@davib0
Traditional “monolithic” architecture
@davib0
μServices!
@davib0
μServices!
● Composing functionality
● Self-contained services
● “Bounded context”
● Independent scaling
● Independent deployment
○ Containers
○ Schedulers
■ Kubernetes
■ Mesos + Marathon
○ PaaS(es)
■ CloudFoundry
● Localized failures
● Prefer statelessness
○ Don’t rely on HTTP Sessions
@davib0
μServices
@davib0
μServices - Let’s try the same pattern
@davib0
μServices - Let’s try the same pattern
Problem #1 - shared user database
@davib0
μServices are distributed
@davib0
μServices
Problem #1 - shared user database
@davib0
μServices
Problem #1 - shared user database
Solution #1 - distribute!
@davib0
μServices
Problem #1 - shared user database
Solution #1 - distribute!
Problem #2 - who owns the credentials?
@davib0
Single Responsibility
@davib0
μServices
Problem #1 - shared user database
Solution #1 - distribute!
Problem #2 - who owns the credentials?
@davib0
μServices
Problem #1 - shared user database
Solution #1 - distribute!
Problem #2 - who owns the credentials?
Solution #2 - Authentication Service
@davib0
μServices
Problem #1 - shared user database
Solution #1 - distribute!
Problem #2 - who owns the credentials?
Solution #2 - Authentication Service
Problem #3 - switching services
@davib0
Authenticate every time?
@davib0
Obviously not
@davib0
Aiming for transparency
vs.
@davib0
μServices - what do we want?
● “Secure”
○ Security is complex
○ Client-side
○ Sharing secrets?
● Stateless services
○ Multiple instances
● No single point of failure
○ On every request
○ When switching services
● No inherent bottlenecks
● Transparency
● Logout?
● Integration with μServices
● Simple to implement
@davib0
μServices
1. Use SSO solutions
2. Distributed session
3. Client-side token
4. Client-side token + API Gateway
@davib0
1. Using SSO
@davib0
Detour: how do these work?
@davib0
A common SSO pattern
1. User requests access
2. Not authenticated
3. User authenticates with SSO Server
4. Authentication successful, grant token
5. User uses token
6. Application uses token to get user details
7. Auth Server returns details
+1 Auth server maintains “global login”
+2 Application maintains “local login”
@davib0
Using SSO solutions
● SSO “login” state is usually opaque
● SSO Service becomes SPOF
● Chatty traffic
● Every switch potentially requires SSO
○ Optimise with local “login” caching
@davib0
Using SSO solutions
Security As good as the chosen SSO ✔
Secret sharing No ✔
Statelessness Relies on HTTP sessions ✘
SPOF @ service switch Authentication server ✘
Bottlenecks Authentication server (switch only) !
Transparent Yes ✔
Logout Complex ✘
Technologies CAS, OAuth2* ✔
Integration Good library support ✔
Implementation Fairly high complexity ✘
@davib0
2. Distributed sessions
@davib0
Distributed sessions
1. User requests access
2. Not authenticated
3. User authenticates with Auth Service
4. Authentication successful
a. Write state to distributed Session Store
i. User X is logged in
ii. Sets TTL
b. Sets Session ID on client side
5. User uses Session ID
6. μService read distributed Session Store
a. Refresh TTL
@davib0
Distributed sessions
Security Opaque, rotatable Session ID ✔
Secret sharing Access to session store ✘
Statelessness Shared state ✔
SPOF @ service switch Session store* !
Bottlenecks Session store (every request) ✘
Transparent Yes ✔
Logout Trivial - delete shared session ✔
Technologies Redis, Cassandra, Hazelcast, Riak ✘
Integration Custom implementation ✘
Implementation Medium/High complexity !
@davib0
3. Client-side tokens
@davib0
3. “Poor man’s certificates”
@davib0
Client side tokens
1. User requests access
2. Not authenticated
3. User authenticates with Auth Server
4. Authentication successful
a. Set ID token on the client side
i. Self-contained
ii. Signed
iii. TTL
5. Services understand ID token
a. Can parse user ID
b. Can verify token
i. Check signature
ii. Check TTL
@davib0
Detour: JSON Web Tokens (JWT)
@davib0
JWT
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzd
WIiOiJteVVzZXJJZCIsIm5hbWUiOiJKb2huIERv
ZSJ9.00q6RI76-oOyQIoshomTVIfmebQPGoDV
2znTErEJjjo
Header
{
"alg": "HS256",
"typ": "JWT"
}
Body
{
"sub": "myUserId",
"name": "John Doe"
}
Signature
@davib0
JWT
● Standard
● Simple
● Extensible
● Can use a variety of signatures (SHA or RSA)
● Good library support
● Symmetric or Public/Private key signatures
● http://jwt.io
@davib0
Client side tokens
1. User requests access
2. Not authenticated
3. User authenticates with Auth Server
4. Authentication successful
a. Set ID token on the client side
i. Self-contained
ii. Signed
iii. TTL
5. Services understand ID token
a. Can parse user ID
b. Can verify token
i. Check signature
ii. Check TTL
@davib0
But...
@davib0
...token is valid until TTL...
@davib0
...and μServices accept it...
@davib0
… so, logout?
@davib0
Client-side tokens: Logout
● Remove token from client-side store
● Periodically check with Auth Service (“renew token”)
● CRL-style revocation
○ Maintain list of revoked tokens
○ Distribute list across μServices (messaging middleware)
● Use short-lived (15m) tokens
@davib0
Client-side tokens
Security Potentially exposing User IDs !
Secret sharing Depends on signature algorithm !
Statelessness Completely stateless ✔
SPOF @ service switch None ✔
Bottlenecks None ✔
Transparent Yes ✔
Logout Complex* (for server-side) !
Technologies JWT, OpenID Connect ✔
Integration Good library support ✔
Implementation Simple ✔
@davib0
4. Client-side tokens
+
API Gateway
@davib0
Client-side tokens + API Gateway
1. User requests access
2. Not authenticated
3. User authenticates with Auth Server
4. Authentication successful
a. Set ID token on the client side
i. Self-contained
ii. Signed
iii. TTL
5. API Gateway translates to opaque token
6. API Gateway resolves to ID token
7. Services understand ID token
a. Can parse user ID
b. Can verify token
i. Check signature
ii. Check TTL
@davib0
API Gateways
● Proxying all user-facing communication
● Fairly simple
● Needs data store (for this use-case)
● Not a distributed session
○ μServices don’t interact with token store
○ μServices are not API Gateway-aware
● Logout
○ Revoke tokens in API Gateway’s token store
@davib0
Client-side tokens + API Gateway
Security Opaque, rotatable Session ID ✔
Secret sharing Depends on signature algorithm !
Statelessness Some state held in API GW !
SPOF @ service switch None ✔
Bottlenecks API Gateway !
Transparent Yes ✔
Logout Trivial ✔
Technologies JWT, nginx, distributed DB, Kong !
Integration Good library support ✔
Implementation Fairly high complexity ✘
@davib0
Summary
@davib0
SSO Distributed Session JWT API GW
Security ✔ ✔ ! ✔
Secret sharing ✔ ✘ ! !
Statelessness ✘ ✔ ✔ !
SPOF @ service
switch
✘ ! ✔ ✔
Bottlenecks ! ✘ ✔ !
Transparent ✔ ✔ ✔ ✔
Logout ✘ ✔ ! ✔
Technologies ✔ ✘ ✔ !
Integration ✔ ✘ ✔ ✔
Implementation ✘ ! ✔ ✘
@davib0
Email: david.borsos@opencredo.com
Twitter: @davib0
http://www.opencredo.com
Questions?

More Related Content

What's hot (20)

PPTX
DeNA の AWS アカウント管理とセキュリティ監査自動化
DeNA
 
PPTX
GraphQLのsubscriptionで出来ること
Shingo Fukui
 
PDF
Azure AD B2CにIdPを色々と繋いでみる
Naohiro Fujie
 
PDF
20210126 AWS Black Belt Online Seminar AWS CodeDeploy
Amazon Web Services Japan
 
PDF
AWS Black Belt Online Seminar - Amazon Lightsail
Amazon Web Services Japan
 
PDF
VPC Reachability Analyzer 使って人生が変わった話
Noritaka Sekiyama
 
PDF
20210127 今日から始めるイベントドリブンアーキテクチャ AWS Expert Online #13
Amazon Web Services Japan
 
PDF
20180509 AWS Black Belt Online Seminar Amazon GuardDuty
Amazon Web Services Japan
 
PDF
202110 AWS Black Belt Online Seminar AWS Site-to-Site VPN
Amazon Web Services Japan
 
PDF
DevOps with Database on AWS
Amazon Web Services Japan
 
PDF
20210216 AWS Black Belt Online Seminar AWS Database Migration Service
Amazon Web Services Japan
 
PDF
AWS CLIでAssumeRole
Tetsunori Nishizawa
 
PDF
AWS Black Belt Online Seminar 2017 AWS Shield
Amazon Web Services Japan
 
PDF
マルチテナント化で知っておきたいデータベースのこと
Amazon Web Services Japan
 
PDF
マイクロにしすぎた結果がこれだよ!
mosa siru
 
PDF
SaaS テナント毎のコストを把握するための「AWS Application Cost Profiler」のご紹介
Amazon Web Services Japan
 
PDF
Keycloakの最近のトピック
Hitachi, Ltd. OSS Solution Center.
 
PDF
わたくし、やっぱりCDKを使いたいですわ〜CDK import編〜.pdf
ssuser868e2d
 
PDF
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
Nov Matake
 
PDF
20190731 Black Belt Online Seminar Amazon ECS Deep Dive
Amazon Web Services Japan
 
DeNA の AWS アカウント管理とセキュリティ監査自動化
DeNA
 
GraphQLのsubscriptionで出来ること
Shingo Fukui
 
Azure AD B2CにIdPを色々と繋いでみる
Naohiro Fujie
 
20210126 AWS Black Belt Online Seminar AWS CodeDeploy
Amazon Web Services Japan
 
AWS Black Belt Online Seminar - Amazon Lightsail
Amazon Web Services Japan
 
VPC Reachability Analyzer 使って人生が変わった話
Noritaka Sekiyama
 
20210127 今日から始めるイベントドリブンアーキテクチャ AWS Expert Online #13
Amazon Web Services Japan
 
20180509 AWS Black Belt Online Seminar Amazon GuardDuty
Amazon Web Services Japan
 
202110 AWS Black Belt Online Seminar AWS Site-to-Site VPN
Amazon Web Services Japan
 
DevOps with Database on AWS
Amazon Web Services Japan
 
20210216 AWS Black Belt Online Seminar AWS Database Migration Service
Amazon Web Services Japan
 
AWS CLIでAssumeRole
Tetsunori Nishizawa
 
AWS Black Belt Online Seminar 2017 AWS Shield
Amazon Web Services Japan
 
マルチテナント化で知っておきたいデータベースのこと
Amazon Web Services Japan
 
マイクロにしすぎた結果がこれだよ!
mosa siru
 
SaaS テナント毎のコストを把握するための「AWS Application Cost Profiler」のご紹介
Amazon Web Services Japan
 
Keycloakの最近のトピック
Hitachi, Ltd. OSS Solution Center.
 
わたくし、やっぱりCDKを使いたいですわ〜CDK import編〜.pdf
ssuser868e2d
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
Nov Matake
 
20190731 Black Belt Online Seminar Amazon ECS Deep Dive
Amazon Web Services Japan
 

Viewers also liked (20)

PPTX
Microservices Manchester: Authentication in Microservice Systems by David Borsos
OpenCredo
 
PPTX
An Authentication and Authorization Architecture for a Microservices World
VMware Tanzu
 
PDF
Stateless authentication for microservices
Alvaro Sanchez-Mariscal
 
PDF
Evolving Project Management: from the sin to the virtue by Antonio Cobo
OpenCredo
 
PDF
ServerlessConf: Serverless for the Enterprise - Rafal Gancarz
OpenCredo
 
PPTX
Microservices - ALM Roadshow 2015
Renato Groff
 
PDF
Haufe #msaday - Seven More Deadly Sins of Microservices by Daniel Bryant
OpenCredo
 
PDF
GOTO LONDON 2016: Concursus Event sourcing Evolved (Updated)
OpenCredo
 
PDF
Voxxed Bristol 2017 - From C to Q, one event at a time: Event Sourcing illust...
OpenCredo
 
PDF
Reactive Microservices By Lorenzo Nicora
OpenCredo
 
PPTX
O'Reilly 2016: "Continuous Delivery with Containers: The Trials and Tribulati...
OpenCredo
 
PDF
Haufe #msaday - Building a Microservice Ecosystem by Daniel Bryant
OpenCredo
 
PDF
High Load Strategy 2016 - Project Management: from Stone Age to DevOps
OpenCredo
 
PDF
A Visual Introduction to Event Sourcing and CQRS by Lorenzo Nicora
OpenCredo
 
PDF
QCON London 2017 - Monitoring Serverless Architectures by Rafal Gancarz
OpenCredo
 
PDF
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt Long
OpenCredo
 
PDF
Haufe #msaday - The Actor model: an alternative approach to concurrency By Lo...
OpenCredo
 
PDF
Microservices Manchester: Microservices and Macro-Economics - A Shorty Histor...
OpenCredo
 
PDF
Vault: Beyond secret storage - Using Vault to harden your infrastructure
OpenCredo
 
PDF
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
OpenCredo
 
Microservices Manchester: Authentication in Microservice Systems by David Borsos
OpenCredo
 
An Authentication and Authorization Architecture for a Microservices World
VMware Tanzu
 
Stateless authentication for microservices
Alvaro Sanchez-Mariscal
 
Evolving Project Management: from the sin to the virtue by Antonio Cobo
OpenCredo
 
ServerlessConf: Serverless for the Enterprise - Rafal Gancarz
OpenCredo
 
Microservices - ALM Roadshow 2015
Renato Groff
 
Haufe #msaday - Seven More Deadly Sins of Microservices by Daniel Bryant
OpenCredo
 
GOTO LONDON 2016: Concursus Event sourcing Evolved (Updated)
OpenCredo
 
Voxxed Bristol 2017 - From C to Q, one event at a time: Event Sourcing illust...
OpenCredo
 
Reactive Microservices By Lorenzo Nicora
OpenCredo
 
O'Reilly 2016: "Continuous Delivery with Containers: The Trials and Tribulati...
OpenCredo
 
Haufe #msaday - Building a Microservice Ecosystem by Daniel Bryant
OpenCredo
 
High Load Strategy 2016 - Project Management: from Stone Age to DevOps
OpenCredo
 
A Visual Introduction to Event Sourcing and CQRS by Lorenzo Nicora
OpenCredo
 
QCON London 2017 - Monitoring Serverless Architectures by Rafal Gancarz
OpenCredo
 
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt Long
OpenCredo
 
Haufe #msaday - The Actor model: an alternative approach to concurrency By Lo...
OpenCredo
 
Microservices Manchester: Microservices and Macro-Economics - A Shorty Histor...
OpenCredo
 
Vault: Beyond secret storage - Using Vault to harden your infrastructure
OpenCredo
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
OpenCredo
 
Ad

Similar to muCon 2016: Authentication in Microservice Systems By David Borsos (20)

PDF
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
HashiCorp
 
PPTX
Secure deployments keeping your application secrets private -duug fest
Henry Been
 
PDF
Securing .NET Core, ASP.NET Core applications
NETUserGroupBern
 
PPTX
BDD Mobile Security Testing (OWASP AppSec Bucharest 2017)
Davide Cioccia
 
PPTX
Authorization and Authentication using IdentityServer4
Aaron Ralls
 
PDF
Application Security in ASP.NET Core
NETUserGroupBern
 
PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PROIDEA
 
PPTX
Zend server 6 compliance
Yonni Mendes
 
PDF
Securing Web Applications with Token Authentication
Stormpath
 
PDF
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CloudIDSummit
 
PPTX
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Beau Bullock
 
PDF
Redundant devops
Szabolcs Szabolcsi-Tóth
 
PPTX
blockchain introduction for computer engineering students
cspdepartmentdrive
 
PPTX
Secure deployments keeping your application secrets private - condensed
Henry Been
 
PPTX
Hacking mobile apps
kunwaratul hax0r
 
PDF
OmniAuth: From the Ground Up
Michael Bleigh
 
PDF
Implementing Microservices Security Patterns & Protocols with Spring
VMware Tanzu
 
PPTX
Spa Secure Coding Guide
Geoffrey Vandiest
 
PPTX
All access demystifying certs
Gary Williams
 
PDF
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
HashiCorp
 
Secure deployments keeping your application secrets private -duug fest
Henry Been
 
Securing .NET Core, ASP.NET Core applications
NETUserGroupBern
 
BDD Mobile Security Testing (OWASP AppSec Bucharest 2017)
Davide Cioccia
 
Authorization and Authentication using IdentityServer4
Aaron Ralls
 
Application Security in ASP.NET Core
NETUserGroupBern
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
PROIDEA
 
Zend server 6 compliance
Yonni Mendes
 
Securing Web Applications with Token Authentication
Stormpath
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CloudIDSummit
 
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Beau Bullock
 
Redundant devops
Szabolcs Szabolcsi-Tóth
 
blockchain introduction for computer engineering students
cspdepartmentdrive
 
Secure deployments keeping your application secrets private - condensed
Henry Been
 
Hacking mobile apps
kunwaratul hax0r
 
OmniAuth: From the Ground Up
Michael Bleigh
 
Implementing Microservices Security Patterns & Protocols with Spring
VMware Tanzu
 
Spa Secure Coding Guide
Geoffrey Vandiest
 
All access demystifying certs
Gary Williams
 
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
Ad

More from OpenCredo (14)

PDF
Webinar - Design Thinking for Platform Engineering
OpenCredo
 
PDF
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
OpenCredo
 
PDF
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
OpenCredo
 
PPTX
Mucon 2018: Heuristics for Identifying Microservice Boundaries By Erich Eichi...
OpenCredo
 
PDF
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
OpenCredo
 
PDF
Machine Learning Game Changer for IT - Maartens Lourens
OpenCredo
 
PDF
Kafka Summit 2018: A Journey Building Kafka Connectors - Pegerto Fernandez
OpenCredo
 
PDF
MuCon 2017: A not So(A) Trivial Question by Tareq Abedrabbo
OpenCredo
 
PDF
DevOpsCon Berlin 2017: Project Management from Stone Age to DevOps By Antoni...
OpenCredo
 
PDF
Hashidays London 2017 - Evolving your Infrastructure with Terraform By Nicki ...
OpenCredo
 
PDF
Succeeding with DevOps Transformation - Rafal Gancarz
OpenCredo
 
PDF
Progscon 2017: Serverless Architectures - Rafal Gancarz
OpenCredo
 
PPTX
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
OpenCredo
 
PDF
Spring Boot Microservices vs Akka Actor Cluster
OpenCredo
 
Webinar - Design Thinking for Platform Engineering
OpenCredo
 
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
OpenCredo
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
OpenCredo
 
Mucon 2018: Heuristics for Identifying Microservice Boundaries By Erich Eichi...
OpenCredo
 
Journeys To Cloud Native Architecture: Sun, Sea And Emergencies - Nicki Watt
OpenCredo
 
Machine Learning Game Changer for IT - Maartens Lourens
OpenCredo
 
Kafka Summit 2018: A Journey Building Kafka Connectors - Pegerto Fernandez
OpenCredo
 
MuCon 2017: A not So(A) Trivial Question by Tareq Abedrabbo
OpenCredo
 
DevOpsCon Berlin 2017: Project Management from Stone Age to DevOps By Antoni...
OpenCredo
 
Hashidays London 2017 - Evolving your Infrastructure with Terraform By Nicki ...
OpenCredo
 
Succeeding with DevOps Transformation - Rafal Gancarz
OpenCredo
 
Progscon 2017: Serverless Architectures - Rafal Gancarz
OpenCredo
 
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
OpenCredo
 
Spring Boot Microservices vs Akka Actor Cluster
OpenCredo
 

Recently uploaded (20)

PDF
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
PPTX
Role_of_Artificial_Intelligence_in_Livestock_Extension_Services.pptx
DrRajdeepMadavi
 
PDF
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PPTX
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
PDF
[GDGoC FPTU] Spring 2025 Summary Slidess
minhtrietgect
 
PDF
Modern Decentralized Application Architectures.pdf
Kalema Edgar
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PDF
NASA A Researcher’s Guide to International Space Station : Fundamental Physics
Dr. PANKAJ DHUSSA
 
PDF
Survival Models: Proper Scoring Rule and Stochastic Optimization with Competi...
Paris Women in Machine Learning and Data Science
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
PPTX
Manual Testing for Accessibility Enhancement
Julia Undeutsch
 
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
Role_of_Artificial_Intelligence_in_Livestock_Extension_Services.pptx
DrRajdeepMadavi
 
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
[GDGoC FPTU] Spring 2025 Summary Slidess
minhtrietgect
 
Modern Decentralized Application Architectures.pdf
Kalema Edgar
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
NASA A Researcher’s Guide to International Space Station : Fundamental Physics
Dr. PANKAJ DHUSSA
 
Survival Models: Proper Scoring Rule and Stochastic Optimization with Competi...
Paris Women in Machine Learning and Data Science
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
Manual Testing for Accessibility Enhancement
Julia Undeutsch
 

muCon 2016: Authentication in Microservice Systems By David Borsos