Best of Authentication2023

  1. 1
    Article
    Avatar of bootcampuxdesignBootcamp·3y

    Backend Projects 🏗️ for Transitioning to a Senior-Level 🙌 Developer 🧑‍💻

    As a backend developer, you play a crucial role in designing and implementing the server-side logic that powers applications. In this article, we will explore a range of project ideas that can help you level up your backend development skills, demonstrate your proficiency in handling advanced concepts, and pave the way for a senior-level developer role.

  2. 2
    Article
    Avatar of bytebytegoByteByteGo·3y

    Sessions, Tokens, JWT, SSO, and OAuth in One Diagram

    The article explains the concepts of sessions, tokens, JWT, SSO, and OAuth in one diagram and discusses the impact of web session management on web applications. It also provides information on the most used Linux commands and outlines the aspects of cloud-native adoption. Additionally, it compares the event sourcing system design with the normal CRUD system design.

  3. 3
    Article
    Avatar of amplicationAmplication·3y

    The Complete Microservices Guide

    Microservices have emerged as a popular architectural approach for designing and building software systems for several compelling reasons and advantages. It is a design approach that involves dividing applications into multiple distinct and independent services called "microservices" Microservices are naturally distributed services as each service is isolated from the others and runs in its own instance.

  4. 4
    Article
    Avatar of permitioPermit.io·3y

    6 Low-Code Tools That Will Make You a Better Frontend Developer

    A developer is measured by their ability to deliver product features in less time while maintaining high code quality. Striking this balance has become more achievable today, thanks to advancements in languages, platforms, CI/CD automation tools, and testing methodologies. We'll explore six low-code tools that can help you become a better frontend developer.

  5. 5
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP69: Explaining JSON Web Token (JWT) To a 10 Year Old Kid

    This week’s system design refresher: DevOps vs. SRE vs. Platform Engineering. Explaining JSON Web Token (JWT) to a 10-year-old Kid is a special box called a JWT. The header is like the label on the outside of the box. It tells us what type of box it is and how it's secured.

  6. 6
    Article
    Avatar of bytebytegoByteByteGo·3y

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1. We discuss the problems each method solves and how to choose the right authentication method for our needs. The diagram below shows where these methods apply in a typical website architecture and their meanings.

  7. 7
    Article
    Avatar of hackernoonHacker Noon·3y

    Building a Full Stack Airbnb Clone with Next.js, Tailwind CSS, Amplication, and More

    Building a Full Stack Airbnb Clone with Next.js, Tailwind CSS, Amplication, and more. The platform is centered around the concept of a low-code development environment. Amplication is an open-source development tool designed to simplify and expedite the process of building web applications.

  8. 8
    Article
    Avatar of devgeniusDev Genius·3y

    Advanced Next.js Concepts

    Learn about advanced Next.js concepts including authentication, serverless functions, and using TypeScript.

  9. 9
    Article
    Avatar of devtoDEV·2y

    A Year of Self-Hosting: 6 Open-Source Projects That Surprised Me in 2023

    Discover innovative and useful open-source projects from 2023 that have revolutionized app creation, task automation, and machine learning.

  10. 10
    Article
    Avatar of hnHacker News·2y

    Stop using JSON Web tokens for user sessions

    Using JSON Web tokens (JWTs) for user sessions without an effectively implemented logout mechanism can lead to security vulnerabilities. An XSS vulnerability can allow an attacker to access and exploit the JWT, gaining unauthorized access to the application.

  11. 11
    Article
    Avatar of livecycleLivecycle·3y

    How to host your side-projects for free in 2023: from Auth to Database

    Hosting side projects without a monthly cost is a great way to bring your ideas to life without breaking the bank. In this article, we’ll explore different categories of services that can help you host your side projects for free in 2023.

  12. 12
    Article
    Avatar of amplicationAmplication·3y

    7 Tips to Build Scalable Node.js Applications

    Node.js is a JavaScript framework created on Chrome's V8 JavaScript engine. If used correctly, it can be used to build highly scalable mission-critical applications. This article will discuss several tips which can be helpful when it comes to building scalable applications.

  13. 13
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    API Security for Developers

    This post provides a high-level checklist for developers to securely develop APIs, covering all OWASP Top 10 API security issues. It emphasizes the importance of secure APIs and the risks they pose. The checklist includes recommendations for broken object-level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfiguration, injection, improper assets management, and insufficient logging and monitoring.

  14. 14
    Article
    Avatar of freecodecampfreeCodeCamp·2y

    Secure Next.js Applications with Role-Based Authentication Using NextAuth

    Learn how to secure Next.js applications with role-based authentication using NextAuth. This comprehensive tutorial covers the basics of NextAuth, integrating OAuth providers, custom authentication provider using MongoDB, and protecting pages on both the server and client side.

  15. 15
    Article
    Avatar of permitioPermit.io·3y

    AuthN vs. AuthZ: Understanding the Difference

    Authentication is the process of verifying the identity of a user or entity, while authorization is the process of granting or denying access to specific resources based on a user's verified identity. Authentication methods include username and password, and biometric authentication. Authorization is managed through policies, such as Role Based Access Control and Attribute Based Access Control.

  16. 16
    Article
    Avatar of devtoDEV·3y

    Mastering Docker for Node.js: Advanced Techniques and Best Practices

    Learn advanced Docker techniques and best practices for containerizing a Node.js authentication API. Topics include multi-stage builds, environment variables, Docker volumes, and using Docker Compose. Follow along to optimize your Docker images and create secure, scalable applications.

  17. 17
    Article
    Avatar of supabaseSupabase·2y

    Supabase is now compatible with Next.js 14

    Next.js 14 was released with performance and stability improvements, including server actions. Supabase is fully compatible with Next.js 14 and has a package called @supabase/ssr and a starter template to simplify building Next.js apps with Supabase.

  18. 18
    Article
    Avatar of asayerasayer·3y

    React: Performing Authentication with JWT

    This article will discuss how to perform JWT authentication in a React app. We will cover the steps involved in setting up a backend JWT endpoint, signing up and signing in from your React app, and protecting routes with JWT validation. You will use a custom-built Express server API to relay the JWT token for a user.

  19. 19
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP75: How Does A Password Manager Work

    This week’s system design refresher: Top 5 Most Used Architecture Patterns. How does a Password Manager work? Implement passkey authentication in minutes (Sponsored) Join TikTok, Paypal, Google, and other leading tech companies by giving your users a faster and more secure sign-in experience with passkeys.

  20. 20
    Article
    Avatar of freecodecampfreeCodeCamp·3y

    How to Secure Routes in Next.js 13 – Client-Side, Server-Side, and Middleware-Based Protection

    Learn how to protect routes in Next.js 13 using three different methods: client-side, server-side, and middleware-based protection.

  21. 21
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP55: Top 7 ChatGPT Developer Hacks

    A good engineer needs to recognize how data structures are used in our daily lives. Engineers should be aware of these data structures and their use cases to create effective and efficient solutions. Message brokers play a crucial role when building distributed systems or microservices to improve their performance, scalability and maintainability.

  22. 22
    Article
    Avatar of freecodecampfreeCodeCamp·3y

    How to Build a Full Stack Application Using ChatGPT

    The full course is designed for all developers, whether you're a beginner or an experienced developer looking to explore new technologies like ChatGPT. The course is structured into detailed, easy-to-follow sections, each focusing on a critical aspect of the full-stack development process.

  23. 23
    Article
    Avatar of streamStream·3y

    Building a WhatsApp Clone with NextJS & Supabase

    This article series explores building a web-based chat app resembling WhatsApp using NextJS, Supabase, and Tailwind. It covers user authentication, group chats, DMs, video calling, and deployment using Vercel.

  24. 24
    Article
    Avatar of permitioPermit.io·3y

    Send SMS Directly from the Browser (No Backend Code Required!)

    We'll learn how to send SMS directly from the browser using Frontend Only Authorization (FoAz) standard. To authenticate our users in the browser, we'll use Clerk.dev, a frontend-first authentication platform that lets you add authentication to your application in minutes. Let's create a new React app by using Vite.

  25. 25
    Article
    Avatar of permitioPermit.io·2y

    What is Token-Based Authentication?

    Explore the concept of token-based authentication, including its advantages over sessions, the different types of tokens used, and the mechanics of how it works.