Access control in message-driven systems by Marc Klefter

Поделиться
HTML-код
  • Опубликовано: 4 фев 2025

Комментарии • 2

  • @gregorywestneat5957
    @gregorywestneat5957 9 месяцев назад +1

    Solid talk!
    Surprising how little there is out there talking about EDA security, in "end-to-end" terms - with reference to user auth (eg JWTs) - and how that translates to access controls between internal processing nodes (eg IAM / resource-based policies).
    This was definitely helpful. Learned a bunch.
    Thanks!

    • @MarcKlefter
      @MarcKlefter 9 месяцев назад +1

      thx for the feedback!