article thumbnail

How to Authenticate to Google Cloud using OpenID Connect in your GitLab CI/CD pipeline

Xebia

In this blog post, I will show you the process of authenticating your GitLab CI/CD pipelines to Google Cloud using OpenID Connect (OIDC). We’ll explore how to set up Google Cloud Service Accounts, Workload Identity Pools, and configure GitLab CI/CD to seamlessly authenticate with Google Cloud. How does the component work?

article thumbnail

Securing S3 Downloads with ALB and Cognito Authentication

Xebia

This would allow your users to download the file using their browsers simply. But what if you want to control who can download the file? For this, you will need authentication and authorization. Authentication vs Authorization Authentication is all about identifying who you are. The latter is authorization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to move your two-factor authentication app to a new device

The Parallax

What the design itself does make clear is that when security-minded consumers upgrade their devices, they will have to take a few extra steps to migrate their two-factor authentication apps. Here’s how the migration process works for the most popular two-factor authentication apps. Switch to your new device.

article thumbnail

Beyond the inbox: ThreatLabz 2025 Phishing Report reveals how phishing is evolving in the age of genAI

CIO

as a result of stronger email authentication protocols like DMARC and Googles sender verification, which blocked 265 billion unauthenticated emails. Suspicious websites are isolated in Zero Trust Browser sessions, shielding users from drive-by downloads, malware, and zero-day infections. Download your copy today.

Report 115
article thumbnail

The Modern Encryption Software Checklist: The Secret to Understanding Your Data Security Needs

User authentication and advanced security factors. Download the checklist today! Key management system. Enterprise features. Flexibility and scalability. Use this resource to foster a greater awareness of your needs, compare different software solutions in detail, and make worrying about data security a thing of the past.

article thumbnail

AWS ClientVPN SAML-based authentication via Tools4ever HelloID

Xebia

Extensive documentation exists for implementing SAML-based authentication for AWS Client VPN through IDPs like Okta and Azure AD, but if you or your customers happen to use a different IDP – documentation is hard to come by. Authorization rules are the first port of entry for any authenticated VPN user. 192.168.1.24/32),

article thumbnail

Set your iPhone up as a Google 2FA key in 5 steps

The Parallax

Google has made it possible to use your iPhone as a two-factor authentication key, just as it did last year for Android phones. Two-factor authentication adds an extra layer of security to account log-ins. That form of 2FA, while certainly more secure than single-factor authentication, is susceptible to SIM card jacking.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.