Setup Keycloak (26) behind Caddy Proxy

Overview Recently, I upgraded keycloak from 17 to 26. The update was swift. Keycloak did all the database migration. However, after the upgrade, the site broke. I set up keycloak behind a Caddy proxy. I hope this helps saving you some hours. Caddy’s config Keycloak’s config You may struggled with issues with mixed content, the … Read more

CISSP 1: Security Governance Through Principles and Policies Concepts and FAQ

Concepts Here are the important concepts in the first section of CISSP Abstraction: Simplifying security by grouping similar elements into classes or roles and assigning security controls collectively. Accounting (Accountability): Review log files to check for compliance and violations to hold subjects responsible for their actions, especially policy violations. Acquisition: Obtaining hardware, software, and services, … Read more

Pitfalls Developers Should Avoid When Transitioning from a Monolithic to a Distributed System

1. Ignoring Network Latency 2. Over-Complicating Service Boundaries 3. Inconsistent Data Management 4. Neglecting Fault Tolerance 5. Insufficient Monitoring and Observability 6. Overhead from Synchronous Communication 7. Overlooking Security Requirements 8. Lack of Proper Service Discovery 9. Data Duplication and Inconsistency 10. No Strategy for Deployment and Updates 11. Underestimating Distributed Transactions Complexity 12. Inadequate … Read more