Category: Security

Tutorial: Running Couchbase Autonomous Operator on minikube with sample App

This hands on tutorial blog primarily covers details around setting up Couchbase Kubernetes Operator on a laptop/desktop running minikube. It features setting up custom TLS certs and persistent volumes. Along with checking how to scale up and down the cluster....

/ September 4, 2019

Custom Authentication with Couchbase Mobile

Custom Authentication with Couchbase Mobile Couchbase Mobile extends Couchbase to the edge, securely managing and syncing data from any cloud to every mobile device. Couchbase Mobile features an embedded database – Couchbase Lite – with SQL and full-text search for...

Node-to-Node Encryption with Couchbase Server 6.5

With security on everyone’s mind, organizations need to run sensitive workloads under stringent security and compliance standards. Couchbase 6.5 preview brings several new security capabilities, and node-to-node encryption has been a top wish list item for many customers. In this...

Managing LDAP groups for external users in 6.5

In the last blog , we described a new feature in Couchbase Server 6.5 called Couchbase groups. In this blog, we will discuss about the new LDAP group capability in Couchbase Server 6.5, along with easy to follow steps to...

Managing Couchbase Users via Groups in 6.5

In large organizations, management of security across the enterprise becomes more and more challenging as the number of apps and users grow. Having a role based access control model enables you to fine control what users get access to. However,...

Autonomous Operator 1.2.0 Public Connectivity

In my previous article I discussed—from a high level—the new Public Connectivity feature in Autonomous Operator 1.2.0.  This was intentionally an abstract overview in order to coax the user to learn about the joys of DDNS, TLS and layer 3...

Couchbase Autonomous Operator on GKE, Securing Couchbase Data Platform with TLS Certs

We are excited to announce release of Couchbase Autonomous Operator 1.2. This is landmark release marking several features requested by customers, mainly Automated Upgrade of Couchbase Clusters Integrated CouchbaseCluster Resource Validation via Adminission Controller Helm Support Public Connectivity for Couchbase...

/ May 6, 2019

Spring Security and Dynamic Client Registration | OAuth Part 3

We already discussed how to configure an OAuth 2.0 authentication and how to build a custom token store. In the last article of this series, you will learn how to implement a custom dynamic client registration using spring-security-oauth2. I recommend you...

How to create a custom Token Store for Spring-securtiy-oauth2 | OAuth Part 2

In the previous blog post, we discussed how to configure a simple OAuth2 authentication. However, our implementation has a major flaw in it: we are using an in-memory token store. In-Memory token stores should be used only during development or...

How to configure an OAuth2 Authentication with Spring-Security-Oauth2 using different data sources | OAuth Part 1

As you might have noticed in my previous blog posts, I am a big fan of Spring + Java and Spring + Kotlin. Consequently, whenever I need to implement an OAuth 2.0 authentication, spring-security-oauth2 lib is a natural choice. However,...