Best of Authentication โ April 2024
- 1
- 2
Community Picksยท2y
How to Learn Kubernetes (Complete Roadmap & Resources)
Learn about the prerequisites, architecture, setting up a cluster, pods and associated resources, securing a cluster, configuration management, the operator pattern, deploying microservices, online resources, and real-world case studies for Kubernetes.
- 3
Robin Wieruchยท2y
Exploring Authentication in Next.js
This post explores the process of implementing authentication in Next.js using Next's App Router, React Server Components (RSC), and Server Actions. It covers the creation of sign-up and sign-in pages, as well as the use of Lucia Auth for session management. The post also discusses the use of Prisma for database access and provides guidance on protecting routes and displaying different navigation items based on the user's authentication status.
- 4
Hacker Newsยท2y
Introducing Stack, the open-source user management service
Introducing Stack, an open-source user management service with components to get started, automatic adaptation to design systems, and a handy admin dashboard. Stack is 100% open-source and has future plans for additional frameworks, SSO/SAML, two-factor authentication, permission management, and more.
- 5
freeCodeCampยท2y
How to Use JSON Web Tokens for Secure Authentication in Flask Applications
Learn how to use JSON Web Tokens (JWTs) to authenticate Flask applications. Discover the authentication mechanisms available for securing data, understand how JWTs work, and follow a step-by-step process to implement JWT-based authentication.
- 6
Community Picksยท2y
Authentication and Authorization in Node.js Applications
This guide explores authentication and authorization concepts in Node.js applications. It covers various authentication methods, such as username and password, token-based authentication with JWT, and OAuth for third-party authentication. It also discusses role-based authorization and security best practices.
- 7
Community Picksยท2y
Implementing Role-Based Access Control (RBAC) in Node.js
This post provides a comprehensive guide on implementing Role-Based Access Control (RBAC) in Node.js. It explains the concept of RBAC, its benefits, and walks readers through the process of implementing RBAC in a Node.js application. The post also discusses best practices and security considerations for RBAC implementation.
- 8
DEVยท2y
Webauth Unlocked: An In-Depth Exploration of Advanced Authentication Solutions
WebAuthn is an open web authentication standard that allows users to log on to websites and applications without using passwords. It uses biometric data, hardware security keys, or PIN codes for authentication. The registration process involves creating a pair of public and private keys, while authentication requires user confirmation and signature verification. WebAuthn provides a high level of security and prevents unauthorized use of keys. The formats for registration and authorization include various fields such as challenge, rp, user, pubKeyCredParams, timeout, excludeCredentials, authenticatorSelection, attestation, and attestationFormats.
- 9
- 10
- 11
- 12
- 13
DEVยท2y
Microsoft Authentication Library Modules
Learn about the Microsoft identity platform, authentication, and app management tools. Implement user authentication and authorization with the Microsoft identity platform. Authenticate users with Microsoft Entra ID in a Java web app. Get started with Java on Azure and expand the capabilities for Java apps on Azure. Discover best practices for Java apps on Azure.
- 14
gitconnectedยท2y
Build a Complete OpenSource LLM RAG QA Chatbot โ ChatEngine
This post discusses how to build a complete open-source LLM RAG QA chatbot using the ChatEngine logic. It covers implementing chat saving to MongoDB, defining primary entities in the chatbot system, and explaining how the ChatEngine logic works.
- 15
strongdmยท2y
9 User Authentication Methods to Stay Secure in 2024
Learn about user authentication methods to stay secure in 2024. Discover the importance of user authentication, the limitations of old methods, and the emerging trends in authentication. Explore advanced authentication methods such as multi-factor authentication, token-based authentication, and just-in-time access.
- 16
- 17
- 18
Supabaseยท2y
Supabase Auth now supports Anonymous Sign-ins
Supabase Auth now supports anonymous sign-ins, allowing users to create temporary accounts without providing signup credentials. Anonymous users can be restricted in accessing certain features based on Row Level Security policies. Supabase Auth provides methods to convert anonymous users to permanent users by linking email, phone, or OAuth identities.
- 19
Hacker Newsยท2y
The Flutter cloud platform
Celest is a Flutter cloud platform that allows developers to build their backend in Dart without leaving their IDE. It offers features such as serverless functions, authentication, data schema definition, access controls, and content serving. Celest has pricing options for solo developers and teams, with a free tier available.
- 20
