In this tutorial, we are demonstrating a step by step guide on how to implement OAuth in MuleSoft API provided by MuleSoft itself as an OAuth Implementation Provider.
Use cases and architectures for Event Streaming, Apache Kafka, Distributed Ledger (DLT) and Blockchain. Comparison: Kafka-native vs Hyperledger vs Ethereum.
Cross-cutting concerns are an integral part of any system design. By identifying and defining the Cross-cutting concerns upfront helps to design more secure and performant applications
AWS Elastic Container Registry can now be setup to automatically scan images on push and provide feedback on vulnerabilities that need to be addressed.
Creating and setting up a JWT server requires some tedious and repetetive steps. In this article we look at how you can use Magic to create it in 1 second