Security

Joel Hans

AI meets privacy: ngrok's secure bridge to customer data

Explore how ngrok enhances AI development by enabling secure, direct access to customer data, ensuring data integrity and privacy.
March 13, 2024
13
min read
Team ngrok

Vulnerability management for customer-controlled environments

Explore vulnerability management in cloud apps, focusing on SaaS accessing customer databases in BYOC environments, with security and compliance insights.
February 29, 2024
5
min read
Mandy Hubbard

Introducing JWT validation for your API

ngrok's developer-defined API gateway introduces support for JWT validation. Learn about ngrok's implementation and how to add JWT validation to your API endpoints.
February 26, 2024
3
min read
Scott McAllister

Add OAuth 2.0 to a Node.js CRUD app

This blog post provides a guide on securing a Node.js CRUD app by integrating the ngrok JavaScript SDK for stable domain setup and implementing OAuth through Google for user authentication and authorization.
January 26, 2024
7
min read
Mason Johnson

Our next generation firewall project

Read about how we have improved our firewall and created an open-source Firewall Toolkit in the process.
December 7, 2023
5
min read
Matthew Karnowski

Bolster control and governance with ngrok Account Domain Controls

Introducing ngrok Account Domain Controls: Unify user accounts, enforce policies, and secure ngrok usage with ease.
November 8, 2023
5
min read
Josh Hertlein

MFA for your production infrastructure running on ngrok

Learn how ngrok secures your production infrastructure using MFA and Time-Based One Time Passwords (TOTP).
October 18, 2023
3
min read
Arianna Willett

Authentication at the network edge

Enhance network security with various authentication methods at the network edge. Thwart unauthorized access and minimize attack surfaces.
October 17, 2023
5
min read
Frederico Hakamine

Add Auth0 Authentication and authorization to ngrok traffic

Adding auth to applications seems easy at the surface, but it can quickly become a source of frustration once you need to deliver a production-grade solution with features for end-users — i.e. self-service sign-ups, account recovery, and social auth for multiple platforms — and for security — i.e. audit trail, live session management, and authorization policies. In this post, I'll integrate ngrok to Auth0 and solve for these challenges.
June 21, 2023
15
min read
Mike Lloyd

Integrating OAuth into your Rust App

While ngrok is useful to run along side your app, what happens when you embed it into your app and start activating OAuth, webhook verification, load balancing, and more?
April 11, 2023
10
min read
Sam Richard

Expanding ngrok's free plan with security in one line

We strive to take ingress off developers’ plates with our platform and that requires making security-focused features accessible and easy to use. Today, I'm proud to announce an important step in that direction: we're adding our security features — OAuth and Webhook validation — to our free plan.
March 16, 2023
5
min read
Russ Savage

How ngrok Actively Combats Phishing Attacks

Phishing attacks are one of the most common attacks on the internet, and ngrok is committed to actively trying to stop them.
February 28, 2023
5
min read
Russ Savage

ngrok becomes Identity Aware with App Users

Today, we are adding additional visibility for users logging into your application through our edge. Now you can see your application users in the ngrok dashboard and view their identity details. In this blog, I'll explain why this feature is a huge win for security and how you can take advantage of it today.
Keith Casey

There and Back Again: An OAuth Story

I've worked with OAuth 2.0 for over 6 years. It's always been a complex and challenging beast to fight until now.
July 26, 2022
10
min read
Keith Casey

ngrok: Defense in Depth

Securing your environment is challenging in the best of times. With ngrok, you can centralize management to ensure policies are applied consistently, no matter the stack.
June 28, 2022
5
min read
Keith Casey

Authentication with ngrok

In this post, I cover the different methods you can use for authenticating traffic with ngrok, including OAuth and OpenID Connect.
Alan Shreve

ngrok Security Disclosure, May 2022

Last week, we fixed a multi-tenancy bug in the ngrok dashboard’s caching layer that unintentionally leaked data between a small subset of ngrok accounts when they viewed the ngrok dashboard. This bug affected less than 5% of ngrok’s active users. We have contacted all accounts affected by the bug directly via email with instructions for remediation.
May 18, 2022
3
min read
Frederico Hakamine

Securing your Apps with Cloud Edge

Learn how to use ngrok Cloud Edge middleware to address app requirements – such as observability, load balancing, compression, and security – fast and without the burden of running and maintaining a middleware infrastructure.
April 26, 2022
10
min read
Frederico Hakamine

Securing your Applications with OAuth 2.0 in seconds

ngrok Secure Tunnels provides a simple to enable remote access to systems. With one command— i.e. `ngrok http 80` — you can share your apps, APIs, and systems with the world, without complex network configuration, reliability issues, and NAT. However, with power comes great responsibility so let's add OAuth 2.0
April 19, 2022
5
min read