Best of AuthenticationJune 2022

  1. 1
    Article
    Avatar of hashnodeHashnode·4y

    Role-Based Authorization in NodeJs

    Authentication and authorization in Express.js can be achieved easily using middleware functions. To make things easier we made available some starter files if you would like to code along. The finished version lies on the main branch while the starter files are on the starter branch. We made everything simple enough so just anyone whether a beginner or intermediate developer can follow along.

  2. 2
    Article
    Avatar of tuts_plusTuts+·4y

    Authenticating Node.js Applications With Passport

    Node.js applications are no exception to this. In this tutorial, we will use a relatively new but very popular authentication middleware - Passport. We will create a sample Express app from scratch and progress via adding routes to it and authenticating some of those routes. We are creating a Mongoose model which performs CRUD operations on the underlying database.

  3. 3
    Article
    Avatar of asayerasayer·4y

    Web3 Authentication with Next.js, React, and Moralis

    Authentication is essential in providing services to valid users. User credentials such as passwords, smart cards, token devices, and biometrics can be used to prove one’s identity. We will be building a Web3 login page using Next, React, and Moralis.

  4. 4
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·4y

    Vulnerabilities in JS based Applications

    Developers are increasingly gravitating toward frameworks that are written in JavaScript. There are still a lot of vulnerabilities that can be made vulnerable to. In this blog post we shall be going through a few of the vulnerabilities that you can check in a JS based framework. Vulnerabilities in JS based Applications: XSS, CSRF, SQL Injection.

  5. 5
    Article
    Avatar of thnThe Hacker News·4y

    MIT Researchers Discover New Flaw in Apple M1 CPUs That Can't Be Patched

    A novel hardware attack dubbed PACMAN has been demonstrated against Apple's M1 processor chipsets. The vulnerability is rooted in pointer authentication codes (PACs), a line of defense introduced in arm64e architecture. PACs aim to solve a common problem in software security, such as memory corruption vulnerabilities.

  6. 6
    Article
    Avatar of dzDZone·4y

    Introduction to JWT (Also JWS, JWE, JWA, JWK)

    Understanding JWT will give you an edge over the other software engineers. JWT might seem simple at first, but it is pretty hard to understand. In this article, we will explore mainly JWT and JWS. In addition, we'll also go through JWE, JWA, and JWK quickly.