<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Authorization Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/authorization/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/authorization/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Thu, 11 Apr 2024 12:52:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>How to generate Personal access tokens in github?</title>
		<link>https://www.aiuniverse.xyz/how-to-generate-personal-access-tokens-in-github/</link>
					<comments>https://www.aiuniverse.xyz/how-to-generate-personal-access-tokens-in-github/#respond</comments>
		
		<dc:creator><![CDATA[Maruti Kr.]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 12:52:24 +0000</pubDate>
				<category><![CDATA[Git & GitHub]]></category>
		<category><![CDATA[Access Control]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Authentication Developer Settings]]></category>
		<category><![CDATA[Authorization]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[How to generate Personal access tokens in github?]]></category>
		<category><![CDATA[Personal Access Token]]></category>
		<category><![CDATA[Scopes]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Token Generation]]></category>
		<guid isPermaLink="false">https://www.aiuniverse.xyz/?p=18739</guid>

					<description><![CDATA[<p>To generate a personal access token in GitHub, follow these steps: Step1: Sign in to GitHub: Go to github.com and sign in to your GitHub account. Step2: <a class="read-more-link" href="https://www.aiuniverse.xyz/how-to-generate-personal-access-tokens-in-github/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-generate-personal-access-tokens-in-github/">How to generate Personal access tokens in github?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="380" src="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-8-1024x380.png" alt="" class="wp-image-18745" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-8-1024x380.png 1024w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-8-300x111.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-8-768x285.png 768w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-8.png 1125w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>To generate a personal access token in GitHub, follow these steps:</p>



<p><strong><em>Step1:</em> Sign in to GitHub:</strong> Go to github.com and sign in to your GitHub account.</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="211" src="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-3-1024x211.png" alt="" class="wp-image-18740" style="width:841px;height:auto" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-3-1024x211.png 1024w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-3-300x62.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-3-768x158.png 768w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-3.png 1338w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong><em>Step2: </em>Access Settings:</strong> Click on your profile picture in the top-right corner of the page, then click on &#8220;Settings&#8221; from the dropdown menu.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="675" height="654" src="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-4.png" alt="" class="wp-image-18741" style="width:837px;height:auto" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-4.png 675w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-4-300x291.png 300w" sizes="(max-width: 675px) 100vw, 675px" /></figure>



<p><strong><em>Step3:</em> Select Developer settings:</strong> In the left sidebar, click on &#8220;Developer settings&#8221;.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="966" height="449" src="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-5.png" alt="" class="wp-image-18742" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-5.png 966w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-5-300x139.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-5-768x357.png 768w" sizes="auto, (max-width: 966px) 100vw, 966px" /></figure>



<p><strong><em>Step4: </em>Choose Personal access tokens: </strong>In the Developer settings menu, click on &#8220;Personal access tokens&#8221;.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="659" height="385" src="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-6.png" alt="" class="wp-image-18743" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-6.png 659w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-6-300x175.png 300w" sizes="auto, (max-width: 659px) 100vw, 659px" /></figure>



<p><strong><em>Step5: </em>Generate a new token: </strong>Click on the &#8220;Generate new token&#8221; button. You may be prompted to enter your password for verification.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="327" src="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-7-1024x327.png" alt="" class="wp-image-18744" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-7-1024x327.png 1024w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-7-300x96.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-7-768x245.png 768w, https://www.aiuniverse.xyz/wp-content/uploads/2024/04/image-7.png 1238w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong><em>Step6: </em>Configure your token:</strong> Give your token a descriptive name that will help you remember its purpose. Then, select the desired scopes for the token. Scopes define what actions the token can perform, such as accessing repositories, creating gists, or managing notifications.</p>



<p><strong><em>Step7:</em> Generate the token:</strong> Once you&#8217;ve configured the token, click on the &#8220;<strong>Generate token</strong>&#8221; button at the bottom of the page.</p>



<p><strong><em>Step8: </em>Copy your token:</strong> GitHub will generate a personal access token for you. Make sure to copy this token immediately as it will not be displayed again.</p>



<p><strong><em>Step9: </em>Store your token securely:</strong> Treat your token like a password and keep it secure. Do not share it publicly or commit it to version control repositories.</p>



<p>That&#8217;s it! You&#8217;ve successfully generated a personal access token in GitHub. You can now use this token to authenticate your requests when accessing GitHub APIs or performing actions programmatically.</p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-generate-personal-access-tokens-in-github/">How to generate Personal access tokens in github?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/how-to-generate-personal-access-tokens-in-github/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>3 Tips for Securing Microservices</title>
		<link>https://www.aiuniverse.xyz/3-tips-for-securing-microservices/</link>
					<comments>https://www.aiuniverse.xyz/3-tips-for-securing-microservices/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 07 May 2019 06:33:52 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[Architecture]]></category>
		<category><![CDATA[Authorization]]></category>
		<category><![CDATA[Fault-Tolerance]]></category>
		<category><![CDATA[Signal Sciences]]></category>
		<category><![CDATA[Web Application]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=3470</guid>

					<description><![CDATA[<p>Source:-cmswire.com In an ideal world, cybersecurity would take care of itself. But even with microservices, a contemporary architecture type with significant advantages over monolithic architectures, security remains an <a class="read-more-link" href="https://www.aiuniverse.xyz/3-tips-for-securing-microservices/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/3-tips-for-securing-microservices/">3 Tips for Securing Microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source:-cmswire.com</p>
<p>In an ideal world, cybersecurity would take care of itself. But even with microservices, a contemporary architecture type with significant advantages over monolithic architectures, security remains an issue. In fact, some security issues are actually harder to resolve in a microservices architecture.</p>
<p>While this topic is open to debate, CMSWire has spoken to industry experts for their views and insights.</p>
<h2>What Are the Security Issues Associated With a Microservices Architecture?</h2>
<p>Eric Sheridan, chief scientist at WhiteHat Security, explained that a microservices application has, on average, 180 vulnerabilities, whereas a monolithic has approximately 39. “The issue with a microservices architecture is it frequently utilizes vulnerable third-party components,” he said.  For example, say you ask developers to imagine that they are responsible for maintaining a monolithic application that declares and makes use of a vulnerable third-party component. “Once the component is declared, it’s represented as a single vulnerability. Now, imagine you are decomposing that same application into 25 separate microservices. Assuming those microservices leverage the same third-party component, you now have 25 vulnerabilities represented,” Sheridan said.</p>
<p>Sheridan went on to say that the use of vulnerable third-party components will become a common security issue for the next several years, which is why ensuring your brand possesses the ability to identify these vulnerable components is critical.</p>
<p>The other security issue associated with microservices, as identified by Jonathan DiVincenzo, head of product at Signal Sciences, are the new attack vectors. “What were once internal calls within an application — inside the monolith — are now delivered across the network, and across the internet, to other services. In this context, application security is one of the largest gaps of microservices,” said DiVincenzo.</p>
<p>“[Since] most microservices run via HTTP, the same security concerns as traditional application security apply from data injection attacks, cross-site scripting and privilege escalation to command execution. If sufficient monitoring or defense solutions aren’t put into place, you run the risk of being vulnerable to business logic attacks that could ultimately go undetected,” said DiVincenzo.</p>
<p>So how can organizations ensure that their microservices architecture is secure? Below our interviewees share 3 tips.</p>
<h2>1. Implement a Web Application Firewall</h2>
<p>A firewall can protect your microservices from recognized cyberthreats. However, “to stay ahead of attacks, you must have a modern web application firewall (WAF) that is not only capable of monitoring and identifying common web application attacks, but one that has the ability to detect business logic flaws, user account takeovers, or monitor any application flow users need,” said DiVincenzo.</p>
<p>DiVincenzo added that ATO is one the “biggest” concerns for organizations. DiVincenzo suggested utilizing a WAF that has a “specific ATO story” to protect your microservices against “unauthorized account access.”</p>
<h2>2. Develop Each Microservice With “Fault-Tolerance”</h2>
<p>Best practices and methodology should be followed when developing a microservice. Usually, in a microservices architecture, a microservice will have been designed and developed with its own development framework. Each of these frameworks will have its own security protocols, which can be difficult to manage.</p>
<p>OJ Ngo, CTO and co-f ounder of DH2i, advised brands to design and develop each microservice with an “agreed” best practice for the whole product. “Each service should be developed with fault-tolerance. A failed service should not be allowed to compromise or disrupt the entire stack. Each and every service should be developed and following the same testing and reporting methodology,” said Ngo.</p>
<p>By ensuring each service follows the same methodology, it will enable developers to quickly identify and resolve any issues.</p>
<h2>3. Implement Authorization and Authentication</h2>
<p>With the significantly larger number of independent services, there needs to be a measure of access control and authorization. OAuth is the industry standard as far as authorization goes, but as Jake Lumetta, CEO and co-founder of ButterCMS, explained, it is critical to create proper network boundaries.</p>
<p>“For securing microservices, one problem area is creating the proper network boundaries for services and understanding which services will be on the &#8216;edge&#8217; and available to the public and which services will be &#8216;internal&#8217; and should only be able to speak to other trusted microservices. Depending on who is consuming the service (public vs. internal) different levels of authentication and authorization will be needed,” said Lumetta.</p>
<p>The post <a href="https://www.aiuniverse.xyz/3-tips-for-securing-microservices/">3 Tips for Securing Microservices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/3-tips-for-securing-microservices/feed/</wfw:commentRss>
			<slash:comments>9</slash:comments>
		
		
			</item>
	</channel>
</rss>
