Rate Limiting at the Edge with HAProxy: Part 2
See how OneLogin used HAProxy to implement rate limiters at their edge. Part two of a two part series on implementing rate limits.
See how OneLogin used HAProxy to implement rate limiters at their edge. Part two of a two part series on implementing rate limits.
Find out where MFA falls in Biden's new Executive Order requirements. The federal government is outlining Zero Trust requirements.
See how to use stick tables to implement a simple rate limiter. HAProxy provides robust functionality and extensibility through Lua.
See how OneLogin’s Hydra Cloud Infrastructure prevented a massive OneLogin service outage due to an AWS service outage.
See how an Identity and Management (IAM) solution like OneLogin can help fulfill your Cyber Security Insurance needs.
The on-prem vs the cloud debate gets personal. We know on-prem seems safe and comfortable, but the time has come to make the move.
Read the G2 Grid Reports to find out why OneLogin was named a leader in Identity Access Management and Customer Identity Access Management.
See how and why OneLogin designed their Engineering Career Development program, the lessons they learned, and why you need one, too.
See how OneLogin found their Key Principles, Constraints, and Insights in designing systems for scale and reliability.
See why OneLogin has been named a Leader in the Identity as a Service (IDaaS) for Enterprise field in the Forrester Wave report for Q3 2021.
Learn how we developed a reliability dashboard. We wanted to clearly define reliability in terms that would be meaningful to our customers.
Learn the security risks that high employee turnover can pose to retail organizations and the steps you can take to protect them.