Best of AuthenticationMarch 2023

  1. 1
    Article
    Avatar of devgeniusDev Genius·3y

    Advanced Next.js Concepts

    Learn about advanced Next.js concepts including authentication, serverless functions, and using TypeScript.

  2. 2
    Article
    Avatar of devtoDEV·3y

    Mastering Docker for Node.js: Advanced Techniques and Best Practices

    Learn advanced Docker techniques and best practices for containerizing a Node.js authentication API. Topics include multi-stage builds, environment variables, Docker volumes, and using Docker Compose. Follow along to optimize your Docker images and create secure, scalable applications.

  3. 3
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)

    This post explains the concept of JSON Web Tokens (JWT), specifically focusing on the explanation and exploitation of JWT header parameters such as JWK and JKU. It provides examples and discusses techniques for exploiting these parameters.

  4. 4
    Article
    Avatar of javacodegeeksJava Code Geeks·3y

    RESTful Architecture Cheatsheet

    RESTful architecture is a scalable and interoperable approach for building web services. It offers benefits such as scalability, interoperability, simplicity, flexibility, and security. The HTTP verbs used in RESTful architecture are GET, POST, PUT, DELETE, HEAD, OPTIONS, PATCH, CONNECT, TRACE, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, and LOCK. Resources in a RESTful API are identified using unique URIs, and plural noun conventions are often used for collections. Authentication and authorization are important aspects of securing RESTful APIs, and various mechanisms such as Basic Auth, OAuth, and RBAC can be used.

  5. 5
    Article
    Avatar of honeybadgerHoneybadger·3y

    Complete Guide to Authentication in JavaScript

    Learn how to implement authentication using JavaScript, Node.js, Express, and MongoDB. Create and register new users, log in with credentials, refresh access tokens, access protected routes, and reset passwords.

  6. 6
    Article
    Avatar of electronElectron·3y

    10 years of Electron 🎉

    Electron has become one of the most popular frameworks for building desktop applications today. The first commit to the repository was on March 13, 2013. Electron v1 was released in 2016, promising increased API stability and better docs and tooling. The road to the decade mark has been long and winding.

  7. 7
    Article
    Avatar of logrocketLogRocket·3y

    Understanding guards in NestJS

    Guards in NestJS control program flow and determine access to endpoints. They can be applied at different levels and enhance security and organization in NestJS applications.

  8. 8
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x01)

    Learn about JWT's, their structure, and how they can be exploited. Explore flawed signature verification and brute forcing the secret key.

  9. 9
    Article
    Avatar of phProduct Hunt·3y

    A powerful web3 auth developer platform

    Dynamic is a powerful web3 auth developer platform that offers smart login flows for crypto-native users, simple onboarding flows for everyone else, and powerful developer tools. Share your wisdom and leave a review for Dynamic.

  10. 10
    Article
    Avatar of towardsdevTowards Dev·3y

    NestJS Authentication: Single Sign On with SAML 2.0

    This post explores how to implement Single Sign On with SAML 2.0 using NestJS, providing a guide for user authentication in web applications.