Best of AuthenticationSeptember 2023

  1. 1
    Article
    Avatar of bytebytegoByteByteGo·3y

    Sessions, Tokens, JWT, SSO, and OAuth in One Diagram

    The article explains the concepts of sessions, tokens, JWT, SSO, and OAuth in one diagram and discusses the impact of web session management on web applications. It also provides information on the most used Linux commands and outlines the aspects of cloud-native adoption. Additionally, it compares the event sourcing system design with the normal CRUD system design.

  2. 2
    Article
    Avatar of amplicationAmplication·3y

    The Complete Microservices Guide

    Microservices have emerged as a popular architectural approach for designing and building software systems for several compelling reasons and advantages. It is a design approach that involves dividing applications into multiple distinct and independent services called "microservices" Microservices are naturally distributed services as each service is isolated from the others and runs in its own instance.

  3. 3
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP75: How Does A Password Manager Work

    This week’s system design refresher: Top 5 Most Used Architecture Patterns. How does a Password Manager work? Implement passkey authentication in minutes (Sponsored) Join TikTok, Paypal, Google, and other leading tech companies by giving your users a faster and more secure sign-in experience with passkeys.

  4. 4
    Article
    Avatar of streamStream·3y

    Building a WhatsApp Clone with NextJS & Supabase

    This article series explores building a web-based chat app resembling WhatsApp using NextJS, Supabase, and Tailwind. It covers user authentication, group chats, DMs, video calling, and deployment using Vercel.

  5. 5
    Article
    Avatar of andrewlock.NET Escapades·3y

    Introducing the Identity API endpoints

    ASP.NET Core Identity lets you store user accounts in your app, manage user details, enable two factor authentication, and associate third-party logins with users. These endpoints serve as API-friendly alternatives to the "default UI" that has been available for some time.

  6. 6
    Article
    Avatar of freecodecampfreeCodeCamp·3y

    Rust Project – Create an Authentication Server

    Rust Project is designed to provide developers with the skills and knowledge they need to implement modern authentication solutions. The Rust programming language is often used for system-level programming, emphasizing safety, concurrency, and performance. The course offers a step-by-step guide to understanding and implementing user authentication in Rust.

  7. 7
    Article
    Avatar of newstackThe New Stack·3y

    5 Best Practices for Securing Your API Gateway

    Learn about five best practices for securing your API gateway, including token-based authentication, role-based access control, rate limiting, explicit CORS policy, and real-time monitoring and alerting for anomalies.

  8. 8
    Article
    Avatar of hackernoonHacker Noon·3y

    Effective Use Of Middleware In Express.js: Practical Approaches

    Middleware acts as a bridge between the incoming client requests and the outgoing server responses. It's like a helpful intermediary that steps in to process, modify, or augment requests as they move through your application. Middleware in Express.js helps streamline your application flow, enhancing its performance, security, and functionality.

  9. 9
    Article
    Avatar of communityCommunity Picks·3y

    Hacktoberfest Magic: ✨ Github Unlocked Using Filters

    The article discusses how to find the perfect project to contribute to during Hacktoberfest using GitHub filters. It also introduces SAML Jackson, a service that streamlines web application authentication.

  10. 10
    Article
    Avatar of newstackThe New Stack·3y

    How to Write Your Own Email Server in Rust

    The result of this small personal hackathon is edgemail, an open source disposable email server. In this post, you’ll see how to write and deploy one yourself. In order to not go out of storage, old mail will be cleaned up periodically.

  11. 11
    Article
    Avatar of supabaseSupabase·3y

    Supabase Blog: Open Source Firebase alternative Blog

    Supabase Beta October 2022 introduces new SDKs, quickstarts, Functions tricks, and announces the date for Launch Week 6.

  12. 12
    Article
    Avatar of permitioPermit.io·3y

    401 vs. 403 Error Codes: What's the Difference? When to Use Each? (Updated 2023)

    Learn about the differences between 401 and 403 error codes. Understand when and how to use each code for authentication and authorization purposes.

  13. 13
    Article
    Avatar of freecodecampfreeCodeCamp·3y

    How to Manage Users in Linux

    Linux is an open-source operating system that is widely used in various applications. One of the fundamental aspects of Linux is user management, which enables administrators to control access to resources and maintain security of the system. This article serves as a comprehensive guide to user management in Linux.

  14. 14
    Article
    Avatar of streamStream·3y

    WhatsApp Web Clone Tutorial: User Authentication & Chat

    The article provides a tutorial on building a WhatsApp web clone using NextJS and Supabase for user authentication. It also explains how to add messaging functionality with Stream Chat. The tutorial covers steps for installing the required tooling, setting up the project, implementing user authentication using Supabase, and creating and connecting a Stream Chat project. The article also includes instructions on testing the progress and building the chat interface. The author mentions that the next steps involve making the application look more like WhatsApp and adding video calling functionality.

  15. 15
    Article
    Avatar of communityCommunity Picks·3y

    Introduction to SSH Key Management

    SSH keys are cryptographic keys that enable user authentication to servers. They provide a secure alternative to traditional passwords. By using an SSH key, you can: - Elevate the security of your environment by disabling regular password access and mandating a passphrase-protected SSH key.

  16. 16
    Article
    Avatar of newstackThe New Stack·3y

    Secure Go APIs with Decentralized Identity Tokens, Part 1

    The rise of decentralized identity tokens adds a new dimension to API security. Traditionally, API authentication and authorization relied heavily on centralized identity providers. Decentralized identity tokens allow individuals to have greater control over their identities and authenticate themselves without relying on central authority.

  17. 17
    Article
    Avatar of permitioPermit.io·3y

    You're Doing Shift-Left Wrong

    You're Doing Shift-Left Wrong. Learn how to shift left in a method that will impact the product's security. Avoid friction between security and development teams.