• Articles (4)
Identity in Engineering
0

Identity Management Strategy as a Relying Party for OAuth 2.0

Users encounter new products every day, and their real-world entity manifests itself in multiple virtual identities across the internet. Creating an account or authenticating one’s virtual identity is a necessary and ubiquitous precursor to performing any meaningful action on a website, such as purchasing an item, posting a message, etc. This article reflects upon a well-defined orchestration on how to integrate identity providers while acting as a relying party, the strategies followed to resolve collision in identities, and its overall architectural flow.

By: Senthilkumar Gopal
photo-1483478550801-ceba5fe50e8e
photo-1483478550801-ceba5fe50e8e
Identity in Engineering
0

Google Sign-In Integration for the eBay Android App

Every day we hear news of data breaches and passwords being stolen or compromised.

By: Senthilkumar Gopal
Coding Practices in Engineering
0

Finite-State Machine for Single-Use Code Authentication

eBay strives to excel at security and to identify new and improved secure mechanisms to allow users to seamlessly access their account and in the meantime ensure that the fraudulent and malicious users are kept at bay.

By: Senthilkumar Gopal
photo-1484557052118-f32bd25b45b5
photo-1484557052118-f32bd25b45b5
Coding Practices in Engineering
0

Application Resiliency Using Netflix Hystrix

Resilience is the ability of the network to provide and maintain an acceptable level of service in the face of various faults and challenges to normal operation.

By: Senthilkumar Gopal
Senthilkumar Gopal

Senthilkumar Gopal

Join Our Team

At eBay, we seek the very best talent to help us build more economic opportunity for everyone.