<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Eugene Orlovsky</title>
    <description>The latest articles on DEV Community by Eugene Orlovsky (@company_perfsys_3fd837950).</description>
    <link>https://dev.to/company_perfsys_3fd837950</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3442276%2F936e19c8-d11f-4bc7-a1c4-8441647dfae5.JPG</url>
      <title>DEV Community: Eugene Orlovsky</title>
      <link>https://dev.to/company_perfsys_3fd837950</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/company_perfsys_3fd837950"/>
    <language>en</language>
    <item>
      <title>How a Simple SSO Decision Unlocked 2 Faster Growth</title>
      <dc:creator>Eugene Orlovsky</dc:creator>
      <pubDate>Fri, 13 Feb 2026 11:43:58 +0000</pubDate>
      <link>https://dev.to/company_perfsys_3fd837950/how-a-simple-sso-decision-unlocked-2-faster-growth-3m47</link>
      <guid>https://dev.to/company_perfsys_3fd837950/how-a-simple-sso-decision-unlocked-2-faster-growth-3m47</guid>
      <description>&lt;p&gt;If you're managing multiple digital products and your login system feels messy, slow, or fragile — this is for you.&lt;/p&gt;

&lt;p&gt;In this article, I’ll show you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why fragmented authentication quietly kills scalability
&lt;/li&gt;
&lt;li&gt;How we designed a centralized Keycloak SSO platform on AWS
&lt;/li&gt;
&lt;li&gt;What actually reduced support tickets by 30–40%
&lt;/li&gt;
&lt;li&gt;How to scale identity without vendor lock-in
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No theory. Just what worked in practice.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Real Problem: Identity Was Slowing Growth
&lt;/h2&gt;

&lt;p&gt;When this Western European energy provider came to us, their authentication system technically worked.&lt;/p&gt;

&lt;p&gt;But it didn’t scale.&lt;/p&gt;

&lt;p&gt;Four sub-brands.&lt;br&gt;&lt;br&gt;
Multiple portals.&lt;br&gt;&lt;br&gt;
Different user roles.&lt;br&gt;&lt;br&gt;
Rising security requirements.&lt;/p&gt;

&lt;p&gt;Every new product meant new integration effort.&lt;br&gt;&lt;br&gt;
Every login issue meant another support ticket.&lt;/p&gt;

&lt;p&gt;And in regulated industries like energy, identity isn’t just UX — it’s risk management.&lt;/p&gt;

&lt;p&gt;I’ve seen this pattern many times. Login becomes “just a feature”… until it quietly becomes your biggest bottleneck.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa1b7scokztpge4pkir45.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa1b7scokztpge4pkir45.png" alt="As digital services expanded, fragmented login management created a cascade of complexity across security, operations, and user access" width="800" height="656"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Why We Chose Keycloak (And Why It Matters)
&lt;/h2&gt;

&lt;p&gt;There are dozens of managed login providers.&lt;/p&gt;

&lt;p&gt;But this client wanted long-term control. No SaaS dependency. No pricing surprises. No architectural lock-in.&lt;/p&gt;

&lt;p&gt;So we built the solution around &lt;strong&gt;Keycloak&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Why?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open-source and widely adopted
&lt;/li&gt;
&lt;li&gt;Full support for OAuth 2.0 and OpenID Connect
&lt;/li&gt;
&lt;li&gt;Deep customization capabilities
&lt;/li&gt;
&lt;li&gt;No vendor lock-in
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We’ve tested other approaches before. For complex multi-brand setups, flexibility always wins.&lt;/p&gt;

&lt;p&gt;And honestly — I love when infrastructure is something the business truly owns.&lt;/p&gt;




&lt;h2&gt;
  
  
  Architecture First. Always.
&lt;/h2&gt;

&lt;p&gt;We didn’t just “install Keycloak.”&lt;/p&gt;

&lt;p&gt;We treated identity as core infrastructure.&lt;/p&gt;

&lt;p&gt;Here’s what we built on AWS:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Centralized Keycloak cluster
&lt;/li&gt;
&lt;li&gt;Private VPC for admin access
&lt;/li&gt;
&lt;li&gt;Public endpoints only for authentication flows
&lt;/li&gt;
&lt;li&gt;Clear separation between dev, staging, and production
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security wasn’t an add-on. It was baked in.&lt;/p&gt;

&lt;p&gt;And yes — this part is where most teams start drowning in complexity.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pro Tip: Treat Identity as Infrastructure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If authentication lives inside each product separately, you’re accumulating identity debt.&lt;/p&gt;

&lt;p&gt;Centralize early. Even if you're small.&lt;/p&gt;

&lt;p&gt;Future you will be grateful.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffaeaih1fgkc4nhynkstt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffaeaih1fgkc4nhynkstt.png" alt="Keycloak deployment across private and public AWS VPCs, separating administrative access from customer-facing authentication." width="800" height="791"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  What Actually Moved the Needle
&lt;/h2&gt;

&lt;p&gt;Let’s talk outcomes — not architecture diagrams.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. One Login Across Four Brands
&lt;/h3&gt;

&lt;p&gt;Customers now use a single identity across all services.&lt;/p&gt;

&lt;p&gt;For the business?&lt;/p&gt;

&lt;p&gt;Product onboarding became &lt;strong&gt;2–3× faster&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;No duplicated logic. No repeated integration headaches.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Custom Admin Tools = Fewer Support Tickets
&lt;/h3&gt;

&lt;p&gt;Out-of-the-box Keycloak admin tools weren’t enough for enterprise support teams.&lt;/p&gt;

&lt;p&gt;So we extended them.&lt;/p&gt;

&lt;p&gt;Better visibility into account states.&lt;br&gt;&lt;br&gt;
Clearer troubleshooting workflows.&lt;br&gt;&lt;br&gt;
Faster issue resolution.&lt;/p&gt;

&lt;p&gt;Result?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;30–40% fewer login-related support requests.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That’s not cosmetic improvement. That’s operational cost reduction.&lt;/p&gt;

&lt;p&gt;According to Gartner, password-related issues can account for up to 50% of helpdesk calls in some organizations. Reducing identity friction directly reduces IT overhead.&lt;/p&gt;

&lt;p&gt;We’ve seen this repeatedly across projects.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pro Tip: Invest in Admin UX&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most companies optimize customer login.&lt;/p&gt;

&lt;p&gt;Almost no one optimizes the admin side.&lt;/p&gt;

&lt;p&gt;That’s where massive efficiency gains hide.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  3. Secure Impersonation for Support
&lt;/h3&gt;

&lt;p&gt;Support teams sometimes need to see what users see.&lt;/p&gt;

&lt;p&gt;But giving broad access? Dangerous.&lt;/p&gt;

&lt;p&gt;We implemented controlled impersonation with strict security boundaries.&lt;/p&gt;

&lt;p&gt;Better support experience.&lt;br&gt;&lt;br&gt;
No compromised controls.&lt;/p&gt;

&lt;p&gt;Balanced systems always win.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. MFA Without Annoying Everyone
&lt;/h3&gt;

&lt;p&gt;Security was non-negotiable.&lt;/p&gt;

&lt;p&gt;But let’s be honest — bad MFA implementations kill UX.&lt;/p&gt;

&lt;p&gt;We designed a balanced approach:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;One-time verification when logging in from a new device
&lt;/li&gt;
&lt;li&gt;Trusted devices don’t trigger repeated prompts
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security improved.&lt;br&gt;&lt;br&gt;
User friction stayed low.&lt;/p&gt;

&lt;p&gt;Wow, I love this approach when it works cleanly.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pro Tip: Smart MFA &amp;gt; Aggressive MFA&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Challenge users only when risk changes.&lt;/p&gt;

&lt;p&gt;Don’t punish them for logging in every day.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  The Business Impact
&lt;/h2&gt;

&lt;p&gt;Here’s what changed after launch:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;4 brands unified under one identity backbone
&lt;/li&gt;
&lt;li&gt;2–3× faster onboarding of new products
&lt;/li&gt;
&lt;li&gt;30–40% reduction in login-related support tickets
&lt;/li&gt;
&lt;li&gt;Clean AWS-based separation between environments
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But here’s the bigger shift:&lt;/p&gt;

&lt;p&gt;Identity stopped being a blocker.&lt;/p&gt;

&lt;p&gt;It became an enabler.&lt;/p&gt;




&lt;h2&gt;
  
  
  What You Can Apply Today
&lt;/h2&gt;

&lt;p&gt;If you're scaling digital products, ask yourself:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do we have one identity system or many?&lt;/li&gt;
&lt;li&gt;Are admin tools helping or slowing support?&lt;/li&gt;
&lt;li&gt;Are we locked into a vendor model that limits flexibility?&lt;/li&gt;
&lt;li&gt;Is MFA increasing trust — or increasing frustration?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If your login architecture feels fragile, don’t wait.&lt;/p&gt;

&lt;p&gt;Identity debt compounds faster than technical debt.&lt;/p&gt;

&lt;p&gt;And fixing it later? Much more painful.&lt;/p&gt;

&lt;p&gt;If you want to modernize your authentication stack — whether with Keycloak or another approach — start by treating identity like infrastructure.&lt;/p&gt;

&lt;p&gt;That’s the shift that changes everything.&lt;/p&gt;




&lt;h2&gt;
  
  
  Ready to Fix Your Identity Layer?
&lt;/h2&gt;

&lt;p&gt;If your team is juggling multiple products, brands, or rising security demands — let’s talk.&lt;/p&gt;

&lt;p&gt;At &lt;a href="https://perfsys.com" rel="noopener noreferrer"&gt;Perfsys&lt;/a&gt;, we design and modernize identity platforms on AWS, from Keycloak customization to full SSO architecture.&lt;/p&gt;

&lt;p&gt;No vendor lock-in. No overengineered fluff. Just systems that scale.&lt;/p&gt;

</description>
      <category>keycloak</category>
      <category>sso</category>
      <category>aws</category>
    </item>
    <item>
      <title>From Azure to AWS: Building a Secure, Automated Cloud for a Growing SaaS</title>
      <dc:creator>Eugene Orlovsky</dc:creator>
      <pubDate>Mon, 18 Aug 2025 11:08:04 +0000</pubDate>
      <link>https://dev.to/company_perfsys_3fd837950/from-azure-to-aws-building-a-secure-automated-cloud-for-a-growing-saas-4a37</link>
      <guid>https://dev.to/company_perfsys_3fd837950/from-azure-to-aws-building-a-secure-automated-cloud-for-a-growing-saas-4a37</guid>
      <description>&lt;h1&gt;
  
  
  How We Migrated a B2B SaaS from Azure to AWS (and Automated CI/CD Along the Way)
&lt;/h1&gt;

&lt;p&gt;Moving clouds isn’t always sunny skies 🌩️➡️☀️.&lt;br&gt;&lt;br&gt;
Recently, our team at &lt;strong&gt;Perfsys&lt;/strong&gt; worked with a fast-growing B2B software company that decided to shift their infrastructure from &lt;strong&gt;Microsoft Azure&lt;/strong&gt; to &lt;strong&gt;Amazon Web Services (AWS)&lt;/strong&gt;.  &lt;/p&gt;

&lt;p&gt;The goal? Build something scalable, SOC2-ready, and developer-friendly — without slowing down releases.  &lt;/p&gt;

&lt;p&gt;Here’s how we tackled it 👇&lt;/p&gt;




&lt;h2&gt;
  
  
  The Situation
&lt;/h2&gt;

&lt;p&gt;The company had built their platform entirely on Azure (AKS, Cosmos DB, Azure Pipelines, etc.).&lt;br&gt;&lt;br&gt;
It worked fine during early development, but cracks started to show:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Environment isolation was unreliable.
&lt;/li&gt;
&lt;li&gt;CI/CD pipelines were fragmented.
&lt;/li&gt;
&lt;li&gt;Secrets management wasn’t great.
&lt;/li&gt;
&lt;li&gt;Monitoring and compliance checks required a lot of manual effort.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As they prepared for a public launch (and SOC2 audit), it became clear: they needed a more &lt;strong&gt;structured, automated, and secure setup&lt;/strong&gt;.  &lt;/p&gt;




&lt;h2&gt;
  
  
  The Game Plan
&lt;/h2&gt;

&lt;p&gt;We broke the migration into &lt;strong&gt;five phases&lt;/strong&gt;, each focused on clear deliverables:  &lt;/p&gt;

&lt;p&gt;📌 &lt;strong&gt;AWS Organization Schema&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0me36ar03rbs44vldyyn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0me36ar03rbs44vldyyn.png" alt=" " width="800" height="579"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;A multi-account AWS layout with IAM Identity Center (SSO), centralized logging, and SOC2 guardrails.&lt;/em&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Discovery &amp;amp; Planning&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mapped dependencies, reviewed CI/CD, and built a migration roadmap.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;AWS Foundation Setup&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Created separate accounts (prod/stage/dev).
&lt;/li&gt;
&lt;li&gt;Set up SSO, centralized logging, and compliance controls.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Infrastructure as Code&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deployed VPC, subnets, RDS (PostgreSQL), S3, ALBs — all through Terraform.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CI/CD Automation&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Connected existing Azure pipelines to AWS ECR + ECS.
&lt;/li&gt;
&lt;li&gt;Built a hybrid pipeline with secure secrets handling.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;📌 &lt;strong&gt;CI/CD Pipeline Overview&lt;/strong&gt; &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9eekj4ierhg9b4k4vixu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9eekj4ierhg9b4k4vixu.png" alt=" " width="800" height="410"&gt;&lt;/a&gt;&lt;br&gt;
   &lt;em&gt;From Git commit → Docker build → ECR → ECS deploy.&lt;/em&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Production Deployment&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;Rolled out services behind VPN-only access.
&lt;/li&gt;
&lt;li&gt;Added image promotion and safe deployment policies.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  The Outcome
&lt;/h2&gt;

&lt;p&gt;By the end of the project, the company had:  &lt;/p&gt;

&lt;p&gt;✅ A &lt;strong&gt;SOC2-ready AWS setup&lt;/strong&gt; with centralized logging and access control.&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Fully automated CI/CD pipelines&lt;/strong&gt; across dev, staging, and production.&lt;br&gt;&lt;br&gt;
✅ Secure, private infrastructure with VPN-only access.&lt;br&gt;&lt;br&gt;
✅ Reproducible environments (Terraform-powered).&lt;br&gt;&lt;br&gt;
✅ Reduced ops overhead via container orchestration and autoscaling.  &lt;/p&gt;

&lt;p&gt;Most importantly, developers could &lt;strong&gt;spin up and tear down environments at will&lt;/strong&gt;, test faster, and ship with confidence 🚀.  &lt;/p&gt;




&lt;h2&gt;
  
  
  Key Takeaway
&lt;/h2&gt;

&lt;p&gt;Cloud migrations don’t have to be painful. With the right structure, automation, and security guardrails, you can move fast &lt;strong&gt;without breaking things&lt;/strong&gt; — or compliance.  &lt;/p&gt;

&lt;p&gt;👉 Curious how this might work for your own team?&lt;br&gt;&lt;br&gt;
Check out &lt;a href="https://perfsys.com/" rel="noopener noreferrer"&gt;perfsys.com&lt;/a&gt; to see how we help companies scale smarter in the cloud.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cicd</category>
      <category>migration</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
