Christoph Eicke
IP Authentication: A Tale of Performance Pitfalls and Challenges in Prod
#1about 1 minute
The case against IP-based authentication for microservices
Migrating a PHP monolith to microservices revealed the fundamental problems with using IP-based authentication, a method you should avoid.
#2about 6 minutes
Understanding the mechanics and tradeoffs of IP authentication
IP authentication simplifies user access for large institutions by mapping an IP address to a user, but it creates issues with user tracking, licensing, and technical complexity.
#3about 3 minutes
Investigating initial deployment failures and performance issues
The first two production deployments failed due to massive error spikes, leading to an architectural change from a slow MySQL database lookup to a faster Redis cache.
#4about 2 minutes
Adopting a fail forward strategy to debug in production
After repeated failures, the team decided to stop rolling back and instead collaborated directly with customers in screen-sharing sessions to diagnose the issue live.
#5about 2 minutes
Discovering the root cause of the infinite redirect loop
The core problem was that legacy and new AWS accounts read the user's IP from different headers, causing a mismatch that sent cookieless bots into an infinite redirect loop.
#6about 2 minutes
How proxies and data entry errors break assumptions
The investigation revealed that academic and corporate proxies often rewrite URLs and strip cookies, and a simple data entry error in the CRM granted access to 1.5% of the internet.
#7about 1 minute
Lessons in collaborative problem-solving and architecture evolution
Using mob programming sessions during the crisis strengthened the team, and the final architecture evolved from Lambda to Fargate for cost and performance reasons.
Related jobs
Jobs that call for the skills explored in this talk.
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
Wilken GmbH
Ulm, Germany
Senior
Kubernetes
AI Frameworks
+3
Matching moments
04:57 MIN
Increasing the value of talk recordings post-event
Cat Herding with Lions and Tigers - Christian Heilmann
02:39 MIN
Establishing a single source of truth for all data
Cat Herding with Lions and Tigers - Christian Heilmann
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
04:57 MIN
Developing resilience by expanding your capacity for failure
What 2025 Taught Us: A Year-End Special with Hung Lee
04:22 MIN
Why HR struggles with technology implementation and adoption
What 2025 Taught Us: A Year-End Special with Hung Lee
03:28 MIN
Why corporate AI adoption lags behind the hype
What 2025 Taught Us: A Year-End Special with Hung Lee
03:38 MIN
Balancing the trade-off between efficiency and resilience
What 2025 Taught Us: A Year-End Special with Hung Lee
Featured Partners
Related Videos
Accelerating Authentication Architecture: Taking Passwordless to the Next Level
Yedidya Schwartz
Single Server, Global Reach: Running a Worldwide Marketplace on Bare Metal in a Cloud-Dominated World
Jens Happe
Scaling: from 0 to 20 million users
Josip Stuhli
Going Beyond Passwords: The Future of User Authentication
Gift Egwuenu
Answering the Million Dollar Question: Why did I Break Production?
Luís Ventura
Reliable scalability: How Amazon.com scales on AWS
Florian Mair
Security Challenges of Breaking A Monolith
Reinhard Kugler
The AI Agent Path to Prod: Building for Reliability
Max Tkacz
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Identity-Team Group
Darmstadt, Germany


Devoteam
Frankfurt am Main, Germany
Remote
API
.NET
Microsoft Office
Microsoft Active Directory





Westhouse Consulting GmbH
Frankfurt am Main, Germany
REST
Docker
Ansible
Grafana
Openshift
+4
