Earlier this month, we analyzed hundreds of millions of transactions across Stripe to identify first-party fraud trends. One of the biggest findings: free trial abuse is rapidly accelerating. From November 2025 to February 2026, our models detected 6.2x more abusive free trials…
Published on: March 5, 2026 11 min read A complete guide to GitLab Container Scanning Explore GitLab's various container scanning methods and learn how to secure containers at every lifecycle stage. security tutorial Container vulnerabilities don't wait for your next deployment.…
Published on: February 25, 2026 2 min read Passkeys now available for passwordless sign-in and 2FA on GitLab Learn how to register a passkey to your account and how two-factor authentication works as a phishing-resistant method. security product Passkeys are now available on Git…
GitHub is the world's best developer experience and the only AI-powered platform with security incorporated into every step, so you can innovate with confidence.
Organizations using GitLab.com SaaS can streamline access control by integrating SAML-based Single Sign-On (SSO) with Google Workspace. This setup enables automated user provisioning and dynamic permission management by mapping Google Workspace groups directly to GitLab roles. The result is a centralized security model that reduces manual administrative tasks while ensuring users have immediate, secure access to the platform.
### Prerequisites and Architectural Benefits
* The integration requires a GitLab Premium or Ultimate subscription and Super Admin access to Google Workspace.
* Once configured, the authentication flow redirects users to Google for credentials, after which Google sends a SAML assertion to GitLab containing user details and group memberships.
* The system supports "Just-in-Time" provisioning, meaning GitLab accounts are created automatically upon a user's first successful login.
* Permissions are dynamic; GitLab updates group memberships and roles every time a user signs in to reflect their current status in Google Workspace.
### Gathering GitLab Configuration Details
* Configuration must be performed at the GitLab top-level group rather than within individual subgroups.
* Administrators need to retrieve the Assertion Consumer Service (ACS) URL, which typically follows the format `https://gitlab.com/groups/[your-group]/-/saml/callback`.
* The Identifier (Entity ID) must be copied to uniquely identify the GitLab group within the Google identity provider settings.
* The GitLab SSO URL is the specific entry point users will utilize to initiate the authentication process.
### Configuring the Google Workspace SAML Application
* Within the Google Admin Console, administrators must create a "Custom SAML app" to house the integration settings.
* The setup process provides a Google SSO URL and a certificate file (typically a `.pem` format) that must be saved for the GitLab-side configuration.
* The previously gathered GitLab ACS URL and Entity ID are entered into the Service Provider details section of the Google app configuration.
### Mapping User Attributes and Synchronizing Groups
* Specific attribute mapping is required to ensure user data flows correctly: Google’s "Primary Email" should map to the "NameID," "First Name" to "firstName," and "Last Name" to "lastName."
* For group synchronization to function, administrators must map selected Google Groups to an app attribute named exactly `groups` (lowercase).
* Google allows for the synchronization of up to 75 groups, which GitLab uses to determine and update user permissions upon login.
* The application must be explicitly turned "ON" for specific organizational units or the entire domain within the Google Admin Console to allow user access.
### Finalizing the Identity Provider Connection
* GitLab requires a SHA-1 certificate fingerprint for security verification rather than the raw certificate file provided by Google.
* Administrators must convert the downloaded Google `.pem` certificate into a SHA-1 fingerprint using an online conversion tool or a command-line utility.
* This fingerprint, along with the Google SSO URL, is entered into GitLab’s SAML SSO settings to establish the trusted connection between the two platforms.
To ensure a smooth rollout, it is recommended to test the integration with a small group of users before enforcing SAML for the entire organization. This allows administrators to verify that group-based permissions are mapping correctly to GitLab roles without disrupting existing workflows.
The Global Hackathon 2025 served as a massive collaborative initiative to unite over 270 technical employees from seven global entities under DeliveryHero’s umbrella, including Woowa Brothers. By leveraging the community-building expertise of the Woowahan DevRel team, the event successfully bridged geographical and technical gaps to foster innovation in "Delivering the Future." The hackathon concluded with high-level recognition from global leadership and a strategic partnership with Google Cloud, demonstrating the power of synchronized global technical synergy.
## Strategic Planning and Global Coordination
* The event adopted a hybrid "Base Camp" model, where participants worked from their local entity offices while staying connected through 24-hour live streaming and centralized online channels.
* Organizers meticulously navigated the logistical hurdles of spanning 70 countries, including coordinating across vastly different time zones and respecting local public holidays and vacation seasons.
* Efficiency was maintained through a decentralized communication strategy, using entity-specific meetings and comprehensive guidebooks rather than frequent global meetings to prevent "meeting fatigue" across time zones.
## Technical Infrastructure and Regulatory Compliance
* To accommodate diverse technical preferences, the infrastructure had to support various stacks, including AWS, Google Cloud Platform (GCP), and specific machine learning models.
* The central organization team addressed complex regulatory challenges, ensuring all sandbox environments complied with strict global security standards and GDPR (EU General Data Protection Regulation).
* A strategic partnership with Google Cloud provided a standardized Google AI-based environment, enabling teams to experiment rapidly with mature tools and cloud-native services.
## Local Operations and Cross-Entity Collaboration
* Physical office spaces were transformed into immersive hackathon hubs to maintain the high-intensity atmosphere characteristic of offline coding marathons.
* The event encouraged "office sharing" between entities located in the same city and even supported travel for members to join different regional base camps, fostering a truly global networking culture.
* Local supporters used standardized checklists and operational frameworks to ensure a consistent experience for participants, whether they were in Seoul, Berlin, or Dubai.
Building a successful global technical event requires a delicate balance between centralized infrastructure and local autonomy. For organizations operating across multiple regions, investing in shared technical sandboxes and robust communication frameworks is essential for turning fragmented local talent into a unified global innovation engine.
Security platform engineer Jung-woo Kim details his transition from a specialized Athenz developer to a "Kubestronaut," a prestigious CNCF designation awarded to those who master the entire Kubernetes ecosystem. By systematically obtaining five distinct certifications, he argues that deep, practical knowledge of container orchestration is essential for building secure, scalable access control systems in private cloud environments. His journey demonstrates that moving beyond application-level expertise to master cluster administration and security directly improves architectural design and operational troubleshooting.
## The Kubestronaut Framework
* The title is awarded by the Cloud Native Computing Foundation (CNCF) to individuals who pass five specific certification exams: CKA, CKAD, CKS, KCNA, and KCSA.
* The CKA (Administrator), CKAD (Application Developer), and CKS (Security Specialist) exams are performance-based, requiring candidates to solve real-world technical problems in a live terminal environment rather than answering multiple-choice questions.
* Success in these exams demands a combination of deep technical knowledge, speed, and accuracy, as practitioners must configure clusters and resolve failures under strict time constraints.
* The remaining Associate-level exams (KCNA and KCSA) provide a theoretical foundation in cloud-native security and ecosystem standards.
## A Progressive Path to Technical Mastery
* **CKAD (Application Developer):** The initial focus was on mastering the deployment of Athenz—an open-source auth system—ensuring it runs efficiently from a developer's perspective. Preparation involved rigorous use of tools like killer.sh to simulate high-pressure environments.
* **CKA (Administrator):** To manage multi-cluster environments and understand the underlying components that make Kubernetes function, the author moved to the administrator level, gaining insight into how various services interact within the cluster.
* **CKS (Security Specialist):** Given his background in security, this was the most critical and difficult stage, focusing on cluster hardening, vulnerability analysis, and implementing strict network policies to ensure the entire infrastructure remains resilient.
## Organizational Impact and Open Source Governance
* Obtaining these certifications provided a clearer understanding of open-source governance, specifically how Special Interest Groups (SIGs) and pull request (PR) workflows drive massive projects like Kubernetes.
* This technical depth was applied to a high-stakes project providing Athenz services in a Bare Metal as a Service (BMaaS) environment, allowing for more stable and efficient architecture design.
* The learning process was supported by corporate initiatives, including access to Udemy Business for technical training and a hybrid work culture that allowed for consistent, early-morning study habits.
To achieve expert-level proficiency in complex systems like Kubernetes, engineers should adopt the "Ubo-cheonri" philosophy—making slow but steady progress. Starting with even one minute of study or a single GitHub commit per day can eventually lead to mastering the highest levels of cloud-native architecture. For those managing enterprise-grade infrastructure, pursuing the Kubestronaut path is highly recommended as it transforms theoretical knowledge into a broad, practical vision for system design.
Messenger has enhanced the security of its end-to-end encrypted chats by launching key transparency, a system that provides an automated, verifiable record of public encryption keys. By moving beyond manual key comparisons, this feature ensures that users can verify their contacts' identities without technical friction, even when those contacts use multiple devices. This implementation allows Messenger to provide a higher level of assurance that no third party, including Meta, has tampered with or swapped the keys used to secure a conversation.
## The Role of Key Transparency in Encrypted Messaging
* Provides a verifiable and auditable record of public keys, ensuring that messages are always encrypted with the correct keys for the intended recipient.
* Prevents "man-in-the-middle" attacks by a compromised server by making any unauthorized key changes visible to the system.
* Simplifies the user experience by automating the verification process, which previously required users to manually compare long strings of characters across every device their contact owned.
## Architecture and Third-Party Auditing
* Built upon the open-source Auditable Key Directory (AKD) library, which was previously used to implement similar security properties for WhatsApp.
* Partners with Cloudflare to act as a third-party auditor, maintaining a public Key Transparency Dashboard that allows anyone to verify the integrity of the directory.
* Leverages an "epoch" system where the directory is updated and published frequently to ensure that the global log of keys remains current and immutable.
## Scaling for Global Messenger Traffic
* Manages a massive database that has already grown to billions of entries, reflecting the high volume of users and the fact that Messenger indexes keys for every individual device a user logs into.
* Operates at a high frequency, publishing a new epoch approximately every two minutes, with each update containing hundreds of thousands of new key entries.
* Optimized the algorithmic efficiency of the AKD library to ensure that cryptographic proof sizes remain small and manageable, even as the number of updates for a single key grows over time.
## Infrastructure Resilience and Recovery
* Improved the system's ability to handle temporary outages and long delays in key sequencing, drawing on two years of operational data from the WhatsApp implementation.
* Replaced older proof methods that grew linearly with the height of the transparency tree with more efficient operations to maintain high availability and real-time verification speeds.
* Established a robust recovery process to ensure that the transparency log remains consistent even after infrastructure disruptions.
By automating the verification of encryption keys through a transparent, audited directory, Messenger has made sophisticated cryptographic security accessible to billions of users. This rollout represents a significant shift in how trust is managed in digital communications, replacing manual user checks with a seamless, background-level guarantee of privacy.
LY Corporation is hosting its global technology conference, Tech-Verse 2025, on June 30 and July 1 to showcase the engineering expertise of its international teams. The event features 127 sessions centered on core themes of AI and security, offering a deep dive into how the group's developers, designers, and product managers solve large-scale technical challenges. Interested participants can register for free on the official website to access the online live-streamed sessions, which include real-time interpretation in English, Korean, and Japanese.
### Conference Overview and Access
* The event runs for two days, from 10:00 AM to 6:00 PM (KST), and is primarily delivered via online streaming.
* Registration is open to the public at no cost through the Tech-Verse 2025 official website.
* The conference brings together technical talent from across the LY Corporation Group, including LINE Plus, LINE Taiwan, and LINE Vietnam.
### Multi-Disciplinary Technical Tracks
* The agenda is divided into 12 distinct categories to cover the full spectrum of software development and product lifecycle.
* Day 1 focuses on foundational technologies: AI, Security, Server-side development, Private Cloud, Infrastructure, and Data Platforms.
* Day 2 explores application and management layers: AI Use Cases, Frontend, Mobile Applications, Design, Product Management, and Engineering Management.
### Key Engineering Case Studies and Sessions
* **AI and Data Automation:** Sessions explore the evolution of development processes using AI, the shift from "Vibe Coding" to professional AI-assisted engineering, and the use of Generative AI to automate data pipelines.
* **Infrastructure and Scaling:** Presentations include how the "Central Dogma Control Plane" connects thousands of services within LY Corporation and methods for improving video playback quality for LINE Call.
* **Framework Migration:** A featured case study details the strategic transition of the "Demae-can" service from React Native to Flutter.
* **Product Insights:** Deep dives into user experience design and data-driven insights gathered from LINE Talk's global user base.
Tech-Verse 2025 provides a valuable opportunity for developers to learn from real-world deployments of AI and large-scale infrastructure. Given the breadth of the 127 sessions and the availability of real-time translation, tech professionals should review the timetable in advance to prioritize tracks relevant to their specific engineering interests.
Figma's commitment to FedRAMP Inside Figma News With Figma’s Federal Risk and Authorization Management Program (FedRAMP) status now "in process," we’re excited to take the next step in improving user experience across the public sector. The pandemic has led to a dramatic and fou…