Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

access management is usually delegated to other systems that supervise UNIX, like AWS


Or Kubernetes. Thats where a standard way of authentication/authorization should be there.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: