credativ® Blog

Here you will find interesting news about industry-specific topics and us.

Categories
Category
Tags

Categories

Tags

Category: HowTos

10 December 2020

Create QR Codes for TOTP Secrets

The article Two-factor authentication for OpenSSH and OpenVPN presented a simple way to increase the security of PAM-enabled services through two-factor authentication. The TOTP method used generates a one-time password that is valid for a limited period of time based on a shared secret. Depending on the method and encoding, the shared secret consists of […]

Read more

30 April 2020

tmate - Efficient remote maintenance and data sovereignty

Editor’s note, as of 2025-08-27: tmate.io and the tmate project have not been updated since fall 2019, so security vulnerabilities that may have arisen since then may not have been addressed. The tool is no longer recommended. Especially in the current situation surrounding COVID-19, a functioning remote maintenance/remote control solution is extremely important. It has […]

Read more

31 March 2020

Podman - Run Container with User Permissions

In our previous article on Buildah, we explained how to create containers without Docker and root privileges. This article will focus on how to use those very containers without elevated privileges. Alongside the already mentioned Buildah and Skopeo, Podman is part of the Red Hat Container Tools and is, in short, a daemonless runtime environment […]

Read more

14 January 2020

Debian integration of Patroni and vip-manager

Patroni is a clustering solution for PostgreSQL® that is getting more and more popular in the cloud and Kubernetes sector due to its operator pattern and integration with Etcd or Consul. Some time ago we wrote a blog post about the integration of Patroni into Debian. Recently, the vip-manager project which is closely related to […]

Read more

01 October 2019

Client certificates for Icinga2 API authentication

There are two ways to authenticate yourself as a client to Icinga2. On the one hand there is the possibility to authenticate yourself by username and password. The other option is authentication using client certificates. With the automated query of the Icinga2 API, the setup of client certificates is not only safety-technically advantageous, but also […]

Read more