У нас вы можете посмотреть бесплатно Inside AuthZed: How SpiceDB Reinvents Authorization at Scale (Jimmy Zelinski Interview) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
A conversation with AuthZed co-founder Jimmy Zelinski live at KubeCon North America 2025. We dig into SpiceDB, modern authorization architectures, Google Zanzibar, why broken authorization is now the #1 OWASP threat, and how AuthZed powers secure, scalable access control for everything from cloud-native apps to AI systems — including ChatGPT’s connector framework. ________________________________________ Timestamp Sections 00:00 – Introduction 00:18 – What AuthZed and SpiceDB do 00:45 – Why authorization can’t live in traditional databases 01:15 – Centralizing permission logic 01:55 – Google as inspiration 02:10 – How Zanzibar shaped modern authorization 02:50 – Evolution: Google+ to company-wide authorization 03:15 – Building SpiceDB from the Zanzibar paper 04:05 – Leaving Red Hat/CoreOS to found AuthZed 04:30 – Access control vs authorization 05:00 – Why authorization is the hard part 06:00 – AuthZed’s enterprise & cloud offerings 06:45 – Dedicated vs shared cloud environments 07:40 – GRPC and performance considerations 08:45 – Where authorization fits in modern architectures 09:00 – Why SpiceDB isn’t part of CNCF 10:00 – Project governance philosophy 10:28 – What “AuthZed” means 11:20 – A to Z / naming story 12:00 – Where authorization is heading 12:20 – Broken authorization as OWASP #1 13:15 – Authorization in AI systems 13:30 – SpiceDB securing ChatGPT connectors 14:00 – Privilege escalation and real-world threats 14:40 – The “new enemy problem” 15:00 – Closing authzed, spicedb, authorization, access control, identity, security, zanzibar, google zanzibar, cloud native, kubernetes, kubecon, barton george, authorization vs authentication, iam, enterprise security, platform engineering, ai security, chatgpt, llm security, developer tools, open source security, red hat, coreos