Best of AuthenticationJanuary 2023

  1. 1
    Article
    Avatar of freecodecampfreeCodeCamp·3y

    How to Build a Real-time Chat App with ReactJS and Firebase

    In the app, we will allow the user to log in with their Google account using Firebase's Google sign-in Authentication. We will also store and retrieve all the chatroom messages using Fire Base's Cloud Firestore. You should have Node.js installed on your system and know how to use the command terminal.

  2. 2
    Article
    Avatar of attiAT&T Israel·3y

    Authentication & Authorization using React, NestJS & JWT Token

    Authentication & Authorization using React, NestJS & JWT Token using NestJS, Passport and JWT libraries for the server side, React, and Redux toolkit (RTK query) for the client side. The article also includes detailed code examples to demonstrate how to implement authentication techniques in practice using JWT token.

  3. 3
    Article
    Avatar of communityCommunity Picks·3y

    Protected Routes and Authentication with React Router

    Protected routes let us choose which routes users can visit based on whether they are logged in. For example, you might have public routes that you want anyone accessing, like a landing page, a pricing page, and the login page. This is a tutorial about React Router protected routes and not about authentication, we'll use a fake Hook.

  4. 4
    Article
    Avatar of asayerasayer·3y

    React Social Logins with Passport JS

    Passport.js is a popular authentication middleware for Node.js that provides a simple and flexible way to authenticate requests made to a web application. It can be used with various authentication mechanisms, such as username and password, two-factor authentication, or social media login, to provide a secure and flexible authentication system.

  5. 5
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP 41: What is Kubernetes?

    The diagram below shows why real-time gaming and low-latency trading applications should not use microservice architecture. Microservice architecture is usually stateless, and the states are persisted in the database. Google Authenticator is a software-based authenticator that implements a two-step verification service.

  6. 6
    Article
    Avatar of dzDZone·3y

    Using JSON Web Encryption (JWE)

    JSON Web Encryption (JWE) could be used when one needs to add sensitive information to a token that one would not want to share with other systems. In this case, the user can decode the token and get all the information from the payload. The full specification of JWE can be found in RFC7516.

  7. 7
    Article
    Avatar of reactnativeexampleReact Native Example·3y

    FoodHub application with React Native

    FoodHub application with React Native foodHubApp-ReactNative Project features. FoodHub app uses React Native to create a menu for foodHub app. The app is available on the FoodHubApp app for food HubApp-reactNative project.

  8. 8
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    Golang Programming and Security Vulnerabilities

    Go is a programming language developed by Google that is designed to be fast, easy to use, and efficient. It is widely used in many different types of applications, including web servers, distributed systems, and command-line tools. In this article, I will be talking about security vulnerabilities on the Golang programming language.