You’re driving through a busy city intersection at rush hour. Cars are inching forward, everyone trying to get to their destination. But then, it happens—one car gets stuck, blocking another, which in turn blocks another. Before you know it, the entire intersection is gridlocked, and no one can move. You’re...

Dive into the world of online permissions and it quickly becomes clear: it’s all about the connections you hold. Imagine being at an upscale gala. It’s not just about your invitation card that gets you through the door. It’s about who you know inside, the conversations you’re a part of,...

Our prior exploration, Authorization Basics of our Scaling Authz blog series, provided a primer on the foundational elements of authorization. Yet as organizations evolve, so too must the systems that safeguard their data and resources. This article delves deeper, defining essential criteria for an adaptive authorization system and starting our...

Welcome back to our Scaling Authz blog series, where we’re documenting our journey toward a scalable and efficient authorization architecture.

Welcome to “Scaling Authz,” a new series dedicated to exploring the complexities and challenges of implementing scalable authorization architectures, especially within the context of microservice environments. In this series, we will delve into the nuances of authorization, various approaches to solve common problems, and the techniques used by industry leaders...