Best of AuthenticationFebruary 2023

  1. 1
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    API Security for Developers

    This post provides a high-level checklist for developers to securely develop APIs, covering all OWASP Top 10 API security issues. It emphasizes the importance of secure APIs and the risks they pose. The checklist includes recommendations for broken object-level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfiguration, injection, improper assets management, and insufficient logging and monitoring.

  2. 2
    Article
    Avatar of permitioPermit.io·3y

    AuthN vs. AuthZ: Understanding the Difference

    Authentication is the process of verifying the identity of a user or entity, while authorization is the process of granting or denying access to specific resources based on a user's verified identity. Authentication methods include username and password, and biometric authentication. Authorization is managed through policies, such as Role Based Access Control and Attribute Based Access Control.

  3. 3
    Article
    Avatar of asayerasayer·3y

    Authentication in React with Supabase

    Learn how to implement user authentication in React applications using Supabase. Supabase is an open-source alternative to Firebase that provides numerous features, such as authentication, database, storage, and real-time APIs. By following the step-by-step instructions in this article, you'll be able to set up a React project with Supabase, implement user registration, login, password reset, and handle page reloads. With Supabase, you can quickly add secure user authentication to your React applications without the need for a dedicated backend.

  4. 4
    Article
    Avatar of gcpGoogle Cloud·3y

    5 ways to implement REST API authentication

    Learn about different authentication methods for implementing REST API authentication in Apigee. Understand the fundamentals of identity, authentication, and authorization. Explore authentication policies such as API Key, OAuth2 token, External token or assertion, Token Exchange, and Identity facade for 3 legged OAuth. Consider design considerations for choosing the right authentication method for your API use case.

  5. 5
    Article
    Avatar of systemweaknessSystem Weakness·3y

    The Pitfalls of JWT Authentication: Why Stateful Sessions are the Safer Option

    This post discusses the pitfalls of using JWT authentication and explains why stateful sessions are a safer option for web applications.

  6. 6
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    Attacking and securing Docker containers

    The Docker daemon is actually the core of the docker environment, it runs containers, pull images and manage all the networks and volume. You can use the Docker daemon through a client, or if you want to make things hard you can connect directly to the Docker socket.

  7. 7
    Article
    Avatar of communityCommunity Picks·3y

    Learn How to Implement User Authentication in Firebase with JavaScript

    Learn how to implement user authentication in Firebase using JavaScript. Understand the benefits of using Firebase for authentication. Follow step-by-step instructions for installation, setup, signing in new users, logging in existing users, and signing out users.