Category: Best Practices and Tutorials
![OIDC Authorization Code Flow for Client Authentication in Couchbase Sync Gateway [Part 3 of 3]](https://www.couchbase.com/blog/wp-content/uploads/2021/07/openid-connect-authorization-code-flow-client-authentication-couchbase-sync-gateway-800x280.jpg)
OIDC Authorization Code Flow for Client Authentication in Couchbase Sync Gateway [Part 3 of 3]
Couchbase Sync Gateway supports OpenID Connect or OIDC-based client authentication. In this context, clients may be Couchbase Lite clients that synchronize data with Sync Gateway over the Internet using the websockets-based replication protocol or they could be web frontend or...

How to Build a Couchbase Autonomous Operator Proof of Concept
Whenever I hear about a customer’s first experience with the Couchbase Autonomous Operator (CAO) for Kubernetes, their first question tends to be “How much?” The answer is that it’s already included in their Enterprise Edition subscription. Joyous to hear this,...

An Introduction to Couchbase Cloud: Migration Made Easy
It’s not a straightforward question to answer: How do I move my on-premises, virtualised or public cloud solution over to a shiny new fully managed cloud infrastructure – with as little disruption as possible? Migration concerns are high on the...
![OIDC Implicit Flow for Client Authentication in Couchbase Sync Gateway [Part 2 of 3]](https://www.couchbase.com/blog/wp-content/uploads/2021/06/oidc-implicit-flow-client-authentication-authorization-couchbase-sync-gateway-800x280.jpg)
OIDC Implicit Flow for Client Authentication in Couchbase Sync Gateway [Part 2 of 3]
OpenID Connect (OIDC) is a popular client authentication mechanism supported by Couchbase Sync Gateway. In this context, clients may be Couchbase Lite clients that synchronize data with Sync Gateway over the Internet using the websockets-based replication protocol or they could...

J is for June, July & Java Developers
As Java developers begin planning their June and July vacations, we felt it would be appropriate to celebrate our own commitment to a four-letter word that starts with J: Java. At Couchbase, this June and July are dedicated to Java...

Using Fluent Bit for Log Forwarding & Processing with Couchbase Server
With the recent release of Couchbase Autonomous Operator (CAO) 2.2, we have recently provided log processing and forwarding for the Kubernetes deployments using the OSS Fluent Bit tooling. This is also OSS and available on GitHub or as a container....
![OAuth 2.0 & OIDC Fundamentals for Authentication & Authorization [Part 1 of 3]](https://www.couchbase.com/blog/wp-content/uploads/2021/06/feature-800x280.png)
OAuth 2.0 & OIDC Fundamentals for Authentication & Authorization [Part 1 of 3]
Developers and architects simply can’t build modern applications without running into issues of authorization and authentication. OAuth 2.0 is an industry standard for “delegated authorization” which is the ability to provide an application or client access to data or features offered...

New and Improved Import in Couchbase Cloud
We’re happy to announce that the release of Couchbase Cloud 1.6 comes with a number of key improvements, particularly in data import. These feature improvements include Import of documents using the Couchbase Cloud Web UI with various key generation and...

How to Use Global Secondary Index Partitioning for More Than Partitions
As a field engineer, I work with customers and often see them using Couchbase features with a “thinking-out-of-the-box” approach. One such feature that I see being used more creatively is Global Secondary Index (GSI) partitions. Let’s first discuss GSI and...

How to Take Python Input in Couchbase
Writing software is never easy. Writing software that appeals to users requires interacting with them. So do you get relevant data that you can put to use on behalf of users? Python – the most-wanted language for building software according...

Why Data Encryption Is Essential
This article aims to bring awareness around the importance of data encryption, considering the astounding rate at which data is being produced, transmitted and consumed. We will discuss the need for data protection, regulation, and some encryption best practices. Organizations...

Alternate Address & Port Support for Couchbase/N1QL Clusters
In order to connect to Couchbase deployments on cloud (AWS, Azure or GCP) or Kubernetes, we support multi-addresses in the form of alternate addresses. External applications use this facility to communicate with the cluster, but not directly to the nodes....