Understanding OAuth2 and OpenID Connect

Updated: 04/26/2025

OAUTH2 and OpenID Connect are popular Authorization and Authentication mechanisms and a lot of confusion around these standards.

In this article, we will unravel the OAUTH2  and OpenID Connect standards through hands-on demonstration of the various flows using the Keycloak OAuth Server.

Here is the link to the article:

Understanding OAuth2 and OpenID Connect

Enjoy 😉 !!!

Pi-hole using Docker on ODroid-C2

Just recently experimented with the use of Pi-hole (running on an ARM based SBC) as the Network-wide Ads and Internet Tracking blocker.

This article provides the step-by-step instructions to get Pi-hole running on Docker.

Here is the link to the article:

Pi-hole using Docker on ODroid-C2

Enjoy 🙂 !!!

Linux Capabilities Unraveled

In the traditional Unix world, the typical way to grant a command (executable file) the superuser (root) privileges is to enable the SUID bit and have it owned by root. Look at the permission of the ping command in Linux – it does *NOT* have the SUID bit set and yet is able to open a raw socket connection … curious to know more ???

Here is the link to the article:

Linux Capabilities Unraveled

Enjoy 🙂 !!!

Hands-on with HashiCorp Vault

Wish you all a Happy, Healthy, Prosperous, & Peaceful 2021

In this article, we will setup and demonstrate the HashiCorp Vault for managing and controlling access to sensitive enterprise assets such as Passwords, Access Tokens, Certificates, etc., on a 3-node VirtualBox based VMs. Here is the link to the article:

Hands-on with HashiCorp Vault

Enjoy 🙂 !!!