Category: Security

Announcing Couchbase Autonomous Operator 2.3 Beta

Announcing Couchbase Autonomous Operator 2.3 Beta

Today, I’m delighted to announce the latest preview of the Couchbase Autonomous Operator 2.3.0-Beta. This beta release is focused on adding some key features introduced in Couchbase Server 7.0 to Autonomous Operator such as scopes and collections, role-based access control...

Announcing the 3.0 Beta Release for Mobile & Edge Computing

Announcing the 3.0 Beta Release for Mobile & Edge Computing

We’re pleased to announce the GA release of the Couchbase Lite 3.0 and Sync Gateway 3.0 platforms for mobile and edge computing solutions This major release makes great strides in the area of edge computing by expanding our edge device platform...

An Introduction to Edge Computing Architectures

An Introduction to Edge Computing Architectures

If I asked five different people what “edge computing” is, I’d most certainly get five different answers. Confusingly, they’d probably all be right. Edge computing is a strategic architecture that’s growing in popularity, but its different permutations and its myriad...

Get Started with Couchbase + Java [Developer Walkthrough]

Get Started with Couchbase + Java [Developer Walkthrough]

If you’re a developer who’s new to Couchbase, this article helps you get started. This weekly walkthrough series helps you understand the basics of connecting to Couchbase, shows you how to retrieve and modify data in Couchbase Server, how to...

October 7, 2021
What Is a Database-as-a-Service (DBaaS)? And Why Is It Important?

What Is a Database-as-a-Service (DBaaS)? And Why Is It Important?

Two decades on, the global shift to the cloud only continues to accelerate. As part of their larger digital transformation strategy, leading enterprises are investing in modern applications that are easy to use, evolve rapidly and deliver a highly customized...

Secure Your Data at Rest with LUKS Disk Encryption in Couchbase

Secure Your Data at Rest with LUKS Disk Encryption in Couchbase

Couchbase now supports LUKS disk encryption to secure your data at rest. How secure is LUKS? Couchbase 7.0 puts a big focus on security, debuting support for both role-based access control (RBAC) for Scopes and Collections, and encryption of at-rest...

Introducing Role-Based Access Control (RBAC) Security for Collections in Couchbase 7.0

Introducing Role-Based Access Control (RBAC) Security for Collections in Couchbase 7.0

Your data in Couchbase just got more secure. Couchbase Server 7.0 introduced Scopes and Collections to better map between relational and NoSQL data models. But the 7.0 release also includes some additional enhancements to strengthen the security of the data...

Announcing Couchbase Server 7.0

Announcing Couchbase Server 7.0

Couchbase Server 7.0 solves the requirements of modern application development. In doing so, it settles the debate over using relational or NoSQL databases. There’s no more need to compromise. (Try it out for yourself here or skip straight to the...

Couchbase Autonomous Operator vs MongoDB Enterprise Kubernetes Operator

Couchbase Autonomous Operator vs MongoDB Enterprise Kubernetes Operator

A Kubernetes Operator is a software extension to Kubernetes that supports built-in capabilities to manage your Kubernetes applications in an automated fashion and that follows Kubernetes principles – especially the Control Loop pattern. Why do we need a Kubernetes Operator?...

OIDC Authorization Code Flow for Client Authentication in Couchbase Sync Gateway [Part 3 of 3]

OIDC Authorization Code Flow for Client Authentication in Couchbase Sync Gateway [Part 3 of 3]

Couchbase Sync Gateway supports OpenID Connect or OIDC-based client authentication. In this context, clients may be Couchbase Lite clients that synchronize data with Sync Gateway over the Internet using the websockets-based replication protocol or they could be web frontend or...

OAuth 2.0 & OIDC Fundamentals for Authentication & Authorization [Part 1 of 3]

OAuth 2.0 & OIDC Fundamentals for Authentication & Authorization [Part 1 of 3]

Developers and architects simply can’t build modern applications without running into issues of authorization and authentication. OAuth 2.0 is an industry standard for “delegated authorization” which is the ability to provide an application or client access to data or features offered...

Announcing Couchbase Autonomous Operator 2.2

Announcing Couchbase Autonomous Operator 2.2

Today we are announcing the General Availability of Couchbase Autonomous Operator for Kubernetes (CAO) Version 2.2. This release provides an automated cloud-native database experience with exciting new features and improvements, such as: Auto-scaling Couchbase services Online storage scaling (scale up...