Best-in-class database replication now combines the benefits of snapshots and log-based systems — while avoiding the drawbacks.
In our last Kong and Okta tutorial, we will implement a basic access control policy based on Okta’s groups and planes. This series will show you how to implement service authentication and authorization for Kong Konnect and Okta using the OpenID Connect (OIDC) plugin.
We all know that what customers see in the market is, in fact, only a small percent of the shifts happening within our organizations. Recently, Time Magazine stated that “Every Company is a Tech Company… The Disruption is Just Beginning.” We’re seeing it in the way we wait in lines, find places to stay when traveling and work from anywhere. The disruption is distribution, and it impacts how we live and build applications.