Best of Authentication โ€” 2024

  1. 1
    Article
    Avatar of devtoDEVยท2y

    JWT explained in 4 minutes (With Visuals)

    Explanation of JWT authentication, its structure, advantages, and disadvantages.

  2. 2
    Article
    Avatar of communityCommunity Picksยท2y

    JWT vs PASETO: New Era of Token-Based Authentication

    The post offers a detailed comparison between JWT (JSON Web Token) and PASETO (Platform-Agnostic Security Tokens), examining their core functionalities, security features, and potential vulnerabilities. While JWT is popular for its simplicity, PASETO addresses many of its security issues by enforcing safer defaults and mitigating algorithm confusion. The post covers the workflows of both token types, their structures, and key differences in their approach to security, making it a valuable read for developers looking to implement secure token-based authentication.

  3. 3
    Article
    Avatar of communityCommunity Picksยท2y

    ๐Ÿ” Session-Based vs. Token-Based Authentication: Which is better?๐Ÿค”

    Learn about session-based and token-based authentication methods used in backend applications. Understand the implementation steps and the key differences between the two methods.

  4. 4
    Article
    Avatar of communityCommunity Picksยท2y

    Better Auth

    Supports popular frontend, backend, and meta frameworks like React, Vue, Svelte, and more. Provides secure email and password authentication, multiple OAuth providers for social sign-on, built-in two-factor authentication, and tools for managing user access. Extend functionality via official and community plugins.

  5. 5
    Video
    Avatar of bytebytegoByteByteGoยท1y

    How SSH Really Works

    SSH is essential for providing secure remote access over unsecured networks. This video explains how SSH creates a secure tunnel between client and server, focusing on SSH2, which offers improved security features compared to SSH1. Key aspects covered include TCP connection establishment, version and algorithm negotiation, key exchange using the Elliptic Curve Diffie-Hellman method, and public key authentication. Once authenticated, all communication between the client and server is encrypted using a session key. SSH also supports local forwarding for tunneling other network services securely.

  6. 6
    Article
    Avatar of communityCommunity Picksยท2y

    ๐Ÿ”‘ OAuth 2.0 flows explained in GIFs

    This post explains OAuth 2.0 flows using GIFs. It covers the terminologies, the Authorization Code Grant flow, and other flows in OAuth 2.0.

  7. 7
    Article
    Avatar of logrocketLogRocketยท2y

    Understanding JWT, OAuth, and Bearer tokens

    In the digital world, authentication and authorization are essential for secure access to online services. JWTs (JSON Web Tokens), OAuth, and Bearer tokens play crucial roles in ensuring security. JWTs are tamper-proof tokens composed of three parts: header, payload, and signature, used for securely transmitting information. OAuth typically utilizes JWTs to transport user information securely. Bearer tokens, included in HTTP headers, authenticate users for accessing protected resources. Understanding these concepts helps improve web security.

  8. 8
    Video
    Avatar of communityCommunity Picksยท2y

    Authentication in React with JWTs, Access & Refresh Tokens (Complete Tutorial)

    This post explains the importance of authentication in a React application and how to handle it using JWTs, access tokens, and refresh tokens. It emphasizes the need for proper authentication to ensure security and prevent data breaches. The post also provides a code example that shows how to implement authentication in a React codebase.

  9. 9
    Article
    Avatar of communityCommunity Picksยท2y

    Passport.js

    Passport.js is an authentication middleware for Node.js that offers a flexible and modular approach to integrating user authentication into Express-based web applications. With over 500 strategies available, it supports various authentication methods such as username/password, social logins, and more.

  10. 10
    Article
    Avatar of asayerasayerยท2y

    Understanding Web Authentication

    Website authentication is crucial for ensuring users are who they claim to be, guarding sensitive information, and maintaining trust. Various authentication methods include password-based, multi-factor, biometric, token-based, and certificate-based authentication. Additionally, common protocols such as OAuth 2.0, OpenID Connect, SAML, and LDAP are used to manage authentication processes securely. Effective implementation involves choosing the right method for user experience and security, integrating both frontend and backend properly, and adhering to security best practices. Balancing security with usability and using adaptive authentication can further enhance security measures.

  11. 11
    Article
    Avatar of robinwieruchRobin Wieruchยท2y

    React Trends in 2024

    Exciting trends in React for 2024 include Astro with React, new authentication alternatives, tRPC for full-stack React applications, React Server Components and Next.js, TanStack Router for SPA React, Vercel pushing React on the Edge, bundlers for React, React Compiler, Biome, and headless UI libraries for React.

  12. 12
    Article
    Avatar of hnHacker Newsยท2y

    stack-auth/stack: Open-source Clerk/Auth0 alternative

    Stack Auth is an open-source, developer-friendly user authentication solution that supports Next.js frontends and backend integrations via REST API. It offers a quick setup and the flexibility to export and self-host user data at any time. The post provides comprehensive setup instructions including dependency installation through Docker, local development execution, and Prisma database initialization. Contributors are encouraged to join their Discord and follow contribution guidelines.

  13. 13
    Article
    Avatar of freecodecampfreeCodeCampยท2y

    How to Build an Invoice SaaS App with Next.js, Resend, Clerk and Neon Postgres

    This tutorial guides you through building a complete invoicing web application using Next.js, Resend, Clerk, and Neon Postgres. Key functionalities include managing customers, creating invoices, printing and sending invoices via email, and handling real-time communication between the frontend and backend. You'll gain experience with setting up a Postgres database, implementing user authentication with Clerk, and using React-to-print for PDF generation.

  14. 14
    Video
    Avatar of wdsWeb Dev Simplifiedยท1y

    How To Handle Permissions Like A Senior Dev

    The post discusses how to handle permissions in applications effectively, moving beyond basic role checks. It covers different permission systems from simple to complex, including role-based access control (RBAC) and attribute-based access control (ABAC), and demonstrates their implementation through code examples and diagrams. The post also explains how to integrate these systems with the authentication service, Clerk, simplifying user role and permission management.

  15. 15
    Article
    Avatar of logrocketLogRocketยท2y

    JWT authentication: Best practices and when to use it

    JWTs are a widely used method for secure data transmission between parties. Although beneficial for API authentication and inter-service communication, JWTs pose challenges, especially in sessions due to token invalidation and storage issues. For secure use, store JWTs in HttpOnly cookies and utilize HTTPS. Consider alternatives for session management to address the limitations and potential security risks associated with JWTs.

  16. 16
    Article
    Avatar of dhhDavid Heinemeier Hanssonยท2y

    Passwords have problems, but passkeys have more

    Implementing passkeys can be extremely complex and their user experience is often subpar. Even in ideal conditions with synced devices, they can pose challenges, especially if access is needed from a non-primary device. While passwords have their issues, such as potential breaches if reused across services, passkeys aren't necessarily a better solution. Using email as a second factor on the first login from a new device is a viable alternative. The author concludes that the complexity and challenges of passkeys don't justify their use over traditional passwords and email-based 2FA solutions.

  17. 17
    Article
    Avatar of awegoAwesome Goยท2y

    Microservices Authentication and Authorization Using API Gateway

    Learn about the challenges of authentication and authorization in a microservices architecture, the benefits of using an API Gateway for access management, and how JSON Web Tokens (JWTs) are used for authentication in microservices.

  18. 18
    Article
    Avatar of freecodecampfreeCodeCampยท2y

    How to Create a REST API Without a Server

    Learn how to create a REST API without a server using a Service Worker in the browser. Showcase your frontend skills and interact with a backend hosted in places where you can't access the server side.

  19. 19
    Article
    Avatar of communityCommunity Picksยท2y

    Next.js and Next-Auth V5: Guide to Social Logins(OAuth)

    Learn how to set up authentication using OAuth providers like Google and GitHub in Next.js using Next-Auth V5.

  20. 20
    Article
    Avatar of lnLaravel Newsยท2y

    Auth Screens for Your Laravel Apps

    Managing multiple Laravel applications becomes simpler with DevDojo Auth, a free, open-source project offering customizable authentication pages compatible with Laravel 10.x and higher. Installation involves using Composer and publishing assets and configurations. The package allows for extensive customization, including setting up social authentication using provider credentials. Additional features include Github action workflows and built-in testing tools like Pest and Dusk.

  21. 21
    Article
    Avatar of communityCommunity Picksยท2y

    JWT Authentication in NodeJS

    Learn how to implement JWT authentication in NodeJS. Understand what JWT is, how it works, and how to use it in a NodeJS project. Set up project environment, create authentication routes, and test the endpoints.

  22. 22
    Article
    Avatar of communityCommunity Picksยท2y

    Build a Login and Logout API using Express.js (Node.js)

    Learn to build a secure login and logout system using Express.js in Node.js. The tutorial covers setting up development files, installing dependencies, and creating a MongoDB database. It explains the basics of authentication and authorization, the logic for user registration and login, password hashing, and session management using JWT tokens. Additionally, it shows how to implement middleware for verifying user sessions and roles, and how to handle user logout securely.

  23. 23
    Article
    Avatar of cerbosCerbosยท2y

    Authentication vs Authorization

    Understanding authentication and authorization is key to securing applications. Authentication verifies user identity, while authorization determines what authenticated users are allowed to do. Authentication methods include passwords and biometrics, whereas authorization relies on access control lists and roles. Effective authorization systems need to be scalable and flexible. Services like Cerbos offer robust, scalable solutions that enhance security by ensuring only permitted users access sensitive data.

  24. 24
    Article
    Avatar of communityCommunity Picksยท2y

    Stop Recommending JWTs (with symmetric keys) โ—† Truffle Security Co.

    This post discusses the issues with using symmetric key JWTs, including the high percentage of guessable keys and the risk of undermining authentication and authorization security.

  25. 25
    Article
    Avatar of neontechNeonยท1y

    WTF Are JWTs?

    JSON Web Tokens (JWTs) are compact, self-contained tokens used for transmitting information securely. They emerged as a solution to the limitations of session-based authentication, offering stateless authentication, cross-domain compatibility, scalability, and security. JWTs are commonly used in modern web applications, especially with services like Neon Authorize, to manage authorization at the database level through row-level security. The process includes signing the tokens to ensure authenticity, though they are not encrypted by default.