Best of Authentication — 2021

  1. 1
    Article
    Avatar of ballerinaBallerina·4y

    Securing Microservices with JWT

    This guide explains how to secure an 'Order Management Service' (RESTful service) with JWT Auth using Ballerina. JWT helps to pass the end-user context across microservices in a manner that can’t be forged. Because the claims set of the JWT is signed by the STS, no microservice can change its content without invalidating its signature.

  2. 2
    Article
    Avatar of bitBits and Pieces·5y

    Best Practices for Using JWT

    JWT tokens are widely used in applications to share security information. Still, they are not entirely foolproof and could open doors for attackers. We can avoid these shortcomings if we use JWTs correctly. In this article, I will discuss 5 best practices you need to follow when using JWT.

  3. 3
    Article
    Avatar of freecodecampfreeCodeCamp·4y

    How to Secure Your React.js Application

    React.js is a scalable open-source JavaScript library and is one of the most commonly used front-end frameworks out there today. It's dynamic and is easy to get started with if you want to create interactive web applications with reusable components. But there are some thing you need to be aware of when using it for your projects.

  4. 4
    Article
    Avatar of hashnodeHashnode·5y

    How I built Rozbnb 🛌 with Next.js , Tailwind CSS, Styled Components , Stripe💰 and Auth0 🔒

    A few weeks ago a great youtuber called Sonny Sangha hosted a 5day challenge of cloning Airbnb. After strategizing I planned to make that clone into a better website with authentication , animation , better UI and so on. The Motivation: I was exploring Auth0 for my website's Authentication so I came across this amazing Hackathon which was hosted by Auth0 and @Hashnode.

  5. 5
    Article
    Avatar of devtoDEV·4y

    Authentication and Authorization with JWTs in Node && Express.js

    In this tutorial, we'll learn how to build an authentication system for a Nodejs & Express application using JWT. We'll be working on the project of this tutorial Build an API using Node, Express, MongoDB, and Docker . You can find the code source for this tutorial here.

  6. 6
    Article
    Avatar of phProduct Hunt·4y

    Pollux - Fake json data & json server mock API generator with JWT

  7. 7
    Article
    Avatar of swlhThe Startup·5y

    Understand the Concept of JWT — JSON Web Tokens

    JWT is an open standard ( RFC 7519) which is used to securely transfer information between two parties. To understand the detail concept of JWT, it’s very important to first know about Session tokens. Once a user registers or logs in with his or her credentials, a server generates a JWT token and assigns it with the data, and passes it to client-side.

  8. 8
    Article
    Avatar of hashnodeHashnode·5y

    Taskify - An app to manage your daily tasks and boost your productivity - HarperDB Hackathon

    Taskify is an Android app that helps you manage all your tasks and track your productivity. It also lets you start a timer to track their time doing a task, It also shows you a detail view of the tasks you did in the last week. Users can login and register using email based authentication and Google authentication.

  9. 9
    Article
    Avatar of devtoDEV·5y

    Mern App ( Node.js / React / Redux / Ant Design ) Crud & Auth

    Starter Antd Admin (Crud & auth) App based on Mern Stack. App built for DigitalOcean MongoDB Hackathon. Based on mern stack (Express.js / MongoDb / React / Redux / AntD) with generic crud and auth , admin management.

  10. 10
    Article
    Avatar of itnextITNEXT·5y

    Designing Microservices with ExpressJS

    Nginx is a unique web server, you can configure it as load balancer or gateway with just a few lines of code. We use Sequelize as ORM, but I won’t dive into details about it, just define Models and use it. Database models are held under src/db/models folder. Business logic files can be separated by model names. Nginx handles all requests coming from 8080.

  11. 11
    Article
    Avatar of newstackThe New Stack·5y

    GitHub Kisses Passwords Goodbye – The New Stack

    GitHub has blocked the use of account passwords when authenticating Git operations. Instead, Git now requires you to use two-factor authentication (2FA) factors. These factors can include personal access tokens; SSH keys, for developers; or OAuth or GitHub App installation tokens for integrators.

  12. 12
    Article
    Avatar of devtoDEV·4y

    Everything about super tokens - an open source alternative to Auth0, Firebase Auth, and AWS Cognito.

    SuperTokens is an open-source "user auth" quick to implement & easy to customize. It uses Cookies that contain an access token that expires and must be refreshed with a refresh token. It enables you to keep your users logged in for a time long in the most secure way possible.

  13. 13
    Article
    Avatar of thnThe Hacker News·5y

    New API Lets App Developers Authenticate Users via SIM Cards

    SIM-based authentication is an identity breakthrough. It is now possible to prevent fraud and fake accounts while seamlessly verifying mobile users using the most cryptographically secure identifier they already have – the SIM card embedded in their mobile devices. SIM swap fraud is a growing issue with serious financial consequences – FinTechs and cryptocurrency wallets have been especially targeted.

  14. 14
    Article
    Avatar of jsPlainEnglishJavaScript in Plain English·5y

    How to create an Authentication System using JWT and Node.js

    In this tutorial, we will learn everything about how you can use JWT in Node.js to authenticate users. We will create APIs for signup, login, and logout using node.js. To complete this tutorial we would require the following: Postman: Used as an API client to Create or Test API’s. Node Package Manager (npm) must be installed in your system.

  15. 15
    Article
    Avatar of devtoDEV·5y

    React User Authentication - Using JWT (Json Web Tokens)

    This article explains how to Add User Authentication to React. We will start using an open-source template and mention all implementation steps that enhance the codebase. In the end, the project will be able to register and authenticate users. The template used in this article is React Soft Dashboard by Creative-Tim.

  16. 16
    Article
    Avatar of itnextITNEXT·5y

    Designing Microservices with ExpressJS

    Nginx is a unique web server, you can configure it as load balancer or gateway with just a few lines of code. We use Sequelize as ORM, but I won’t dive into details about it, just define Models and use it. Database models are held under src/db/models folder. Business logic files can be separated by model names. Nginx handles all requests coming from 8080.

  17. 17
    Article
    Avatar of logrocketLogRocket·4y

    React Native: JWT authentication using Axios interceptors

    React Native is a popular choice for developing complex mobile applications. The main selling point for React Native is that you can reuse a significant part of your React web app code to build a mobile app. Almost every app requires user authentication. To demonstrate how to authenticate users, we will build a demo application.

  18. 18
    Article
    Avatar of oktaOkta Dev·4y

    Build an Electron App with JavaScript and Authentication

    Use Okta’s Auth JS SDK to authenticate your users. Electron is one of the most popular desktop frameworks today. The Electron front end uses HTML, JavaScript, and CSS for its front end and Node.js for its backend. For some companies, allowing localhost to receive the response from Okta may pose a security concern.

  19. 19
    Article
    Avatar of stackovStack Overflow Blog·5y

    Best practices for authentication and authorization for REST APIs

  20. 20
    Article
    Avatar of hashnodeHashnode·5y

    TypingDNA Verify - A New Way to Authenticate Users

    TypingDNA is a company that provides a free authentication API & managed verification solutions for developers. TypingDNA Verify relies on a state-of-the-art authentication engine using AI-based algorithms to verify typing patterns and select the best key phrases. The chances of a security break are very slim because your typing pattern is unique to only you!