Skip to content

Commit

Permalink
fix the invalid tags that have been there forever (#3403)
Browse files Browse the repository at this point in the history
  • Loading branch information
lyleschemmerling authored Nov 22, 2024
1 parent c28d129 commit 4e19235
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion astro/src/content/articles/ciam/auth-facade-pattern.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ As an enterprise software developer, you have a few options:
Like any [facade](https://en.wikipedia.org/wiki/Facade_pattern), the auth facade hides a subsystem; the subsystem hidden here is a client's identity provider. As part of your application, ship an embedded auth and user management system. Your application's authentication and authorization requests are sent to this embedded system. It federates as needed with upstream authentication providers.

<div class="bg-slate-200 px-4 w-full">
<img src="/img/articles/auth-facade/auth-facade-pattern.svg" alt="The identity broker architectural pattern.">
<img src="/img/articles/auth-facade/auth-facade-pattern.svg" alt="The identity broker architectural pattern." />
</div>

## The auth facade vs federation
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ One important factor to consider when comparing identity platforms is whether yo
## Multi-Tenant

<div class="bg-slate-200 flex justify-center p-4 w-full">
<img src="/img/articles/multi-tenant-diagram.png" alt="Multi-tenant solutions">
<img src="/img/articles/multi-tenant-diagram.png" alt="Multi-tenant solutions"/>
</div>

Simply put, multi-tenant is an architecture where multiple companies store their data within the same infrastructure. The entire system can span multiple servers and data centers, but most commonly data is co-mingled in a single database. The tenants are logically isolated, but physically integrated.
Expand Down Expand Up @@ -81,7 +81,7 @@ Joe uses two different websites, `funnymugs.com` and `chucknorrisjokes.com`. Bot
Joe will be very (unpleasantly) surprised if he changes his password on `chucknorrisjokes.com` and magically his password is updated on `funnymugs.com`. This diagram illustrates why this unexpected password change occurs when Acme Corp. is storing single user objects.

<div class="bg-slate-200 flex justify-center p-4 w-full">
<img src="/img/blogs/password-change-tenants.png" alt="Password Change">
<img src="/img/blogs/password-change-tenants.png" alt="Password Change"/>
</div>

This would be a poor user experience and not ideal for Acme Corp. While both users are technically Joe, he is not aware of this nuance in the method that Acme Corp. built their platform.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -63,8 +63,8 @@ Now that we have added the salt, the "password" that we actually generated the h

The second method that attackers use to crack passwords is called brute force cracking. This means that the attacker writes a computer program that can generate all possible combinations of characters that can be used for a password and then computes the hash for each combination. This program can also take a salt if the password was hashed with a salt. The attacker then runs the program until it generates a hash that is the same as the hash from the database. Here's a simple Java program for cracking passwords. We left out some detail to keep the code short (such as all the possible password characters), but you get the idea.

<br>
<br>
<br/>
<br/>

```java
import org.apache.commons.codec.digest.DigestUtils;
Expand Down

0 comments on commit 4e19235

Please sign in to comment.