Certificate-based client authenticationAuthorization is always a challenge in the service-to-service call. In this article, we will explore the possibility of authorizing clients…Feb 17Feb 17
How to strongly secure public APIs using HMACThere is no general authentication method for all types of API. It depends on the API purpose. The API might provide sensitive services…Sep 3, 2023Sep 3, 2023
The game nodes are some regular nodes in K8S clusters with a specific label.You can use Terraform to create these resources on the cloud providers.Jun 19, 2023Jun 19, 2023
Designing a Distributed System for an Online Multiplayer Game — Security Patch (Part 9)This is part number nine of the Garage series, you can access all parts at the end of this post.Nov 11, 2022Nov 11, 2022
Designing a Distributed System for an Online Multiplayer Game — CI/CD (Part 8)This is part number eight of the Garage series, you can access all parts at the end of this post.Apr 2, 2022Apr 2, 2022
Designing a Distributed System for an Online Multiplayer Game — Deployment (Part 7)This is part number seven of the Garage series, you can access all parts at the end of this post.Apr 2, 2022Apr 2, 2022
Designing a Distributed System for an Online Multiplayer Game — Game Client (Part 6)This is part number six of the Garage series, you can access all parts at the end of this post.Apr 2, 2022Apr 2, 2022
Designing a Distributed System for an Online Multiplayer Game — Game Server — Game Server (Part…This is part number five of the Garage series, you can access all parts at the end of this post.Apr 2, 2022Apr 2, 2022
Designing a Distributed System for an Online Multiplayer Game — Game Server (Part 5–1)This is part number five of the Garage series, you can access all parts at the end of this post.Apr 2, 2022Apr 2, 2022
Designing a Distributed System for an Online Multiplayer Game — Game Manager (Part 4)This is part number four of the Garage series, you can access all parts at the end of this post.Apr 2, 2022Apr 2, 2022