Written by Andreas Schwarte on . Posted in Security
(Reading time: 7 - 13 minutes)
This blog post is co-authored by Andreas Schwarte, Principal Software Engineer, and Wolfgang Schell, Principal Software Architect at metaphacts.
In a previous blog post we provided a high-level overview on security-related topics for using metaphactory in an enterprise environment. This post will dive deeper into authentication and authorization using single sign-on and also cover how the authentication process can be integrated with databases or external services such as third-party REST endpoints.
Written by Wolfgang Schell on . Posted in Security
(Reading time: 7 - 13 minutes)
This blog post is co-authored by Wolfgang Schell, Principal Software Architect at metaphacts, and Andreas Schwarte, Principal Software Engineer.
For many of our customers, metaphactory is a key component of their data landscape: their knowledge graph ties together various data silos, provides a semantic access layer based on semantic models, and becomes one of the key systems to support decisions and processes from research to sales.
Keeping all involved systems up and running is a big task that requires many different skills. Besides the operational perspective of working with infrastructure, development, and deployment processes, security plays a growing part in this story.