Identity and Trust for DevOps Engineers
A scenario-driven course on identity and trust for DevOps and platform engineers. Covers cryptographic primitives, TLS and PKI, OAuth 2.0 and OpenID Connect, SAML, LDAP and Active Directory, IdP-as-a-service (Okta), JWTs and key rotation, mTLS and service identity, authorization patterns (RBAC, ABAC, ReBAC), operational SSO, debugging identity and TLS flows, threat modeling, and a full enterprise-identity capstone.
What you'll learn
Curriculum
16 modules · 48 lessonsThe Identity and Trust Problem
What identity actually means in DevOps systems, the trust models that decide what to believe, and the layered identity stack from raw bytes to business logic.
Cryptographic Primitives, Just Enough
The math you cannot avoid: hashing, symmetric and asymmetric encryption, digital signatures, and where keys live.
TLS and Certificates
The handshake step by step, what an X.509 certificate actually contains, and the failure modes that cause production outages.
Public Key Infrastructure and Certificate Operations
Building a chain of trust, the certificate lifecycle, and the operational practice that keeps PKI from becoming an outage.
OAuth 2.0 from First Principles
What OAuth actually solves, the five grant types and when each fits, and the production-grade configuration that does not get breached.
OpenID Connect
OIDC adds identity on top of OAuth: ID tokens, JWKS, and the flows DevOps engineers actually run.
SAML 2.0
Why SAML still runs the enterprise, the assertion model, and how to interoperate with the OIDC world.
Directory and Domain Identity (LDAP, Kerberos, Active Directory)
The identity stack of the enterprise: LDAP directories, Kerberos tickets, and Active Directory in modern infrastructure.
Okta and IdP-as-a-Service
What Okta actually does, configuring it as code, and the playbook for when your IdP goes down.
Token Validation and Key Rotation
JWT internals, JWKS-based key discovery, and the token-exchange / refresh / revocation flows.
Service-to-Service Identity and mTLS
How services prove who they are to each other, mTLS in production meshes, and choosing tokens vs certificates.
Authorization Patterns
Picking the right authorization model, the policy engines worth knowing, and Kubernetes authorization end to end.
Operational SSO
SSO for the internal tools your engineers actually use, session lifecycle, and the MFA / step-up patterns.
Debugging Identity and TLS Flows
The diagnostic toolkit for TLS, OAuth, OIDC, and Kubernetes identity bugs.
Security and Threat Model
Identity-specific threat modeling, the canonical attacks and their defenses, and what zero trust really means for identity.
Capstone Scenario
Three end-to-end exercises: design an enterprise identity architecture, respond to an identity breach, and migrate from legacy to modern identity.
About the Author

Sharon Sahadevan
AI Infrastructure Engineer
Building production GPU clusters on Kubernetes. H100s, large-scale model serving, and end-to-end ML infrastructure across Azure and AWS.
10+ years designing cloud-native platforms with deep expertise in Kubernetes orchestration, GitOps (Argo CD), Terraform, and MLOps pipelines for LLM deployment.
Author of KubeNatives, a weekly newsletter read by 3,000+ DevOps and ML engineers for production insights on K8s internals, GPU scheduling, and model-serving patterns.