Skip to content

Security Concepts

This section provides educational content on the security concepts that underpin Rack Gateway. Whether you’re new to infrastructure security or looking to deepen your understanding, these guides explain the “why” behind the “how.”

Security tools are only as effective as the understanding behind their use. Misconfigurations often stem from conceptual gaps—not technical limitations. These guides aim to:

  • Build intuition about security trade-offs
  • Explain industry standards like OAuth 2.0 and RBAC
  • Connect theory to practice with Rack Gateway examples
  • Support compliance by documenting security rationale

For those new to infrastructure security, we recommend this order:

  1. Authentication vs Authorization - Start with the fundamentals
  2. OAuth 2.0 Explained - Understand modern authentication
  3. Zero Trust Security - Learn the overarching security philosophy
  4. RBAC Principles - Dive into access control design
  5. MFA Security - Add defense in depth
  6. Audit Logging - Enable accountability and compliance
  7. Infrastructure Gateways - Apply these concepts to Rack Gateway
ConceptRack Gateway Implementation
AuthenticationGoogle OAuth with session tokens
AuthorizationRole-based access control (RBAC)
Zero TrustEvery request authenticated and authorized
MFATOTP, WebAuthn, YubiKey support
Audit LoggingImmutable logs with S3 WORM anchoring
Gateway PatternSingle entry point to Convox rack