Our Identity related services encompass everything from designing and implementing identity integrations to reviewing and optimizing existing setups to checking for security implementation issues and providing OAuth/OpenID AppSec focused training
Kodez brings a wealth of expertise in implementing and integrating robust Identity and Access Management systems into applications and APIs across a range of identity providers. We helped Seek to transition from ASP.NET Membership based identity backend to Auth0 with zero downtime.
Kodez can assist in all aspects of Identity from designing and implementing identity integrations to reviewing and optimizing existing setups to checking for security implementation issues and providing OAuth/OpenID AppSec focused training.
Kodez has a close partnership with Auth0 with many of our team are certified Auth0 implementation specialists (more than anywhere else in APAC!) and an Auth0 ambassador recognized for his contribution in this space.
Whilst we’re proud of our partnership with Okta/Auth0 we’re ultimately vendor agnostic and we’ve worked on identity projects across a range of identity providers including Auth0, Microsoft Azure B2C, and Microsoft Azure Active Directory/Entra and Identity server.
Implementing Identity is difficult and has a steep learning curve. It’s easy to make a simple mistake that could potentially lead to a serious security issue.
Kodez can review proposed or existing architectures and train your development teams on common mistakes to watch out for.
Containers have revolutionized the way applications are developed, packaged, and deployed, offering a modular and efficient approach to ensure consistent functionality across varied environments. To leverage the full potential of containerization, Azure presents an array of services and tools tailored to meet diverse needs. This article aims to dissect and compare three prominent Azure services: Azure Container Instances (ACI), Azure Kubernetes Service (AKS), and Azure Container Apps (ACA). We will delve into the distinct features, advantages, and ideal scenarios for each service, providing an analysis of their capabilities and applications.
Most developers are familiar with the OWASP Top 10 that describes the most critical risks to web applications. OWASP also produce a lesser known artefact called the OWASP Top 10 CI/CD Security Risks that describes risks that modern build and deployment systems face that is essential reading for all development teams.