Best of AuthenticationFebruary 2024

  1. 1
    Article
    Avatar of devtoDEV·2y

    JWT explained in 4 minutes (With Visuals)

    Explanation of JWT authentication, its structure, advantages, and disadvantages.

  2. 2
    Article
    Avatar of communityCommunity Picks·2y

    🔑 OAuth 2.0 flows explained in GIFs

    This post explains OAuth 2.0 flows using GIFs. It covers the terminologies, the Authorization Code Grant flow, and other flows in OAuth 2.0.

  3. 3
    Article
    Avatar of robinwieruchRobin Wieruch·2y

    React Trends in 2024

    Exciting trends in React for 2024 include Astro with React, new authentication alternatives, tRPC for full-stack React applications, React Server Components and Next.js, TanStack Router for SPA React, Vercel pushing React on the Edge, bundlers for React, React Compiler, Biome, and headless UI libraries for React.

  4. 4
    Article
    Avatar of awegoAwesome Go·2y

    Microservices Authentication and Authorization Using API Gateway

    Learn about the challenges of authentication and authorization in a microservices architecture, the benefits of using an API Gateway for access management, and how JSON Web Tokens (JWTs) are used for authentication in microservices.

  5. 5
    Article
    Avatar of communityCommunity Picks·2y

    JWT Authentication in NodeJS

    Learn how to implement JWT authentication in NodeJS. Understand what JWT is, how it works, and how to use it in a NodeJS project. Set up project environment, create authentication routes, and test the endpoints.

  6. 6
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·2y

    Securing the Frontend: A Practical Guide for Developers

    This post explores the relationship between frontend development and cybersecurity. It discusses the cybersecurity threats in the frontend, best practices for secure frontend development, and strategies for integrating security into the user experience. Real-world case studies from Google, GitHub, Facebook, Stripe, and Slack are also presented.

  7. 7
    Article
    Avatar of milanjovanovicMilan Jovanović·2y

    Getting the Current User in Clean Architecture

    Learn how to get the current user's information in a Clean Architecture use case using the IUserContext interface and implement it within the Infrastructure layer.

  8. 8
    Article
    Avatar of freecodecampfreeCodeCamp·2y

    Python Back-End Development – Handbook for Beginners

    Learn best practices for user authentication, user authorization, data encryption, secure communication, secure storage, key management, access controls, and regular security testing in Python back-end development.

  9. 9
    Article
    Avatar of asayerasayer·2y

    How To: Authentication Middleware in Next.js

    This post discusses the challenges encountered with authentication in Next.js and how to address them using middleware. It covers topics such as establishing secure user sessions, enforcing access controls, implementing token-based authentication, and integrating role-based authentication.

  10. 10
    Article
    Avatar of freecodecampfreeCodeCamp·2y

    How to Build a Mobile Quiz App with React Native, ChatGPT and Supabase

    Learn how to build a mobile quiz app with React Native, ChatGPT, and Supabase. The tutorial covers authentication, database storage, and ranking users based on their scores. Requires basic knowledge of React Native and data fetching in React applications.

  11. 11
    Article
    Avatar of gitguardianGitGuardian·2y

    Top Secrets Management Tools for 2024

    This post discusses the importance of secrets management in software development and provides a list of top secrets management tools. It covers the main elements of secrets management, what to look for in a secrets management tool, and highlights several popular tools in the market.

  12. 12
    Article
    Avatar of lnLaravel News·2y

    Protect Routes with JWT Tokens Using This Package for Laravel

    Protect Routes with JWT Tokens Using This Package for Laravel makes it easy to generate, consume, and protect routes with JWT tokens in Laravel by providing a JWT facade with helper methods, enforcing a minimal set of claims, and offering HTTP Middleware and Request macro functionality.

  13. 13
    Article
    Avatar of appwrite_sourceAppwrite·2y

    Introducing support for server-side rendering

    Appwrite introduces support for server-side rendering (SSR) authentication patterns. It enhances the developer experience when building applications with frameworks like Next.js, SvelteKit, Nuxt, Astro, Remix, and more. Past limitations of Appwrite's authentication system for SSR have been addressed. Sessions can now be created server-side using Appwrite's server SDKs.

  14. 14
    Article
    Avatar of cerbosCerbos·2y

    Top 5 identity & access management (IAM) tools for 2024

    Explore the top IAM tools for 2024 and how they enhance security and manage user access. Learn about the challenges and benefits of implementing IAM solutions and integrating Cerbos with IAM tools. Discover the potential impact of AI, machine learning, and blockchain on IAM. Stay informed about the latest trends in IAM and learn about Cerbos Hub, a robust authorization management system. Sign up for Cerbos Hub and book a free Policy Workshop with Cerbos.

  15. 15
    Article
    Avatar of appwrite_sourceAppwrite·2y

    From passwords to protection: Implementing 2FA in your applications

    Implementing 2FA in your applications enhances security and protects user data. Learn about different 2FA methods, the implementation process, and best practices.

  16. 16
    Article
    Avatar of communityCommunity Picks·2y

    OctopyID/LaraPersonate: Login as a different user quickly

    OctopyID/LaraPersonate is an Impersonation package for the Laravel Framework that allows you to easily impersonate other users. This post provides installation instructions, explains how to add the HasImpersonation trait to the User model, and discusses the events available with the package.

  17. 17
    Article
    Avatar of communityCommunity Picks·2y

    Clerk.dev tokens in Go Netlify Functions

    The post provides a guide on validating Clerk.dev tokens in Go and extracting the token from Clerk cookies. It also explains how to verify the token using the Clerk client.

  18. 18
    Article
    Avatar of communityCommunity Picks·2y

    Securing Your APIs: Verifying API Keys And Using Scopes

    This post discusses the importance of securing your APIs and provides information on API authentication, API key verification, centralized and decentralized verification methods, OAuth, and user-based permissions for third-party APIs.

  19. 19
    Article
    Avatar of hnHacker News·2y

    Release v1.1.0 · ory/kratos

    Ory Kratos v1.1 is a major release that introduces new features and improvements, such as phone verification and two-factor authentication, translations and internationalization, native support for Sign in with Google and Apple on Android/iOS, account linking, passwordless login using a magic code, session to JSON Web Token conversion, and more.