Huolala Tech
Huolala Tech
Apr 15, 2025 · Information Security

How a Key Management Gateway Secures Third‑Party API Integrations

This article examines the security challenges of integrating third‑party services via OpenAPI, analyzes code and personnel risks of key exposure, and presents a key‑gateway solution that uses KMS, multi‑tenant architecture, customizable signing modules, and robust exception handling to protect sensitive credentials.

API SecurityKMSKey Management
0 likes · 15 min read
How a Key Management Gateway Secures Third‑Party API Integrations
58 Tech
58 Tech
Nov 17, 2022 · Backend Development

Design and Migration Strategies for the WLock Distributed Lock Service

The article presents the architecture of WLock, a Paxos‑based distributed lock service, analyzes key isolation schemes, evaluates cluster expansion and splitting, and details a multi‑step key migration process—including forward and reverse migration, node scaling, and consistency safeguards—to achieve high‑availability and isolated lock handling in multi‑tenant environments.

ConsistencyDistributed LockKey Migration
0 likes · 18 min read
Design and Migration Strategies for the WLock Distributed Lock Service