Best of Authentication โ€” April 2024

  1. 1
    Article
    Avatar of communityCommunity Picksยท2y

    ๐Ÿ” Session-Based vs. Token-Based Authentication: Which is better?๐Ÿค”

    Learn about session-based and token-based authentication methods used in backend applications. Understand the implementation steps and the key differences between the two methods.

  2. 2
    Article
    Avatar of communityCommunity Picksยท2y

    How to Learn Kubernetes (Complete Roadmap & Resources)

    Learn about the prerequisites, architecture, setting up a cluster, pods and associated resources, securing a cluster, configuration management, the operator pattern, deploying microservices, online resources, and real-world case studies for Kubernetes.

  3. 3
    Article
    Avatar of robinwieruchRobin Wieruchยท2y

    Exploring Authentication in Next.js

    This post explores the process of implementing authentication in Next.js using Next's App Router, React Server Components (RSC), and Server Actions. It covers the creation of sign-up and sign-in pages, as well as the use of Lucia Auth for session management. The post also discusses the use of Prisma for database access and provides guidance on protecting routes and displaying different navigation items based on the user's authentication status.

  4. 4
    Article
    Avatar of hnHacker Newsยท2y

    Introducing Stack, the open-source user management service

    Introducing Stack, an open-source user management service with components to get started, automatic adaptation to design systems, and a handy admin dashboard. Stack is 100% open-source and has future plans for additional frameworks, SSO/SAML, two-factor authentication, permission management, and more.

  5. 5
    Article
    Avatar of freecodecampfreeCodeCampยท2y

    How to Use JSON Web Tokens for Secure Authentication in Flask Applications

    Learn how to use JSON Web Tokens (JWTs) to authenticate Flask applications. Discover the authentication mechanisms available for securing data, understand how JWTs work, and follow a step-by-step process to implement JWT-based authentication.

  6. 6
    Article
    Avatar of communityCommunity Picksยท2y

    Authentication and Authorization in Node.js Applications

    This guide explores authentication and authorization concepts in Node.js applications. It covers various authentication methods, such as username and password, token-based authentication with JWT, and OAuth for third-party authentication. It also discusses role-based authorization and security best practices.

  7. 7
    Article
    Avatar of communityCommunity Picksยท2y

    Implementing Role-Based Access Control (RBAC) in Node.js

    This post provides a comprehensive guide on implementing Role-Based Access Control (RBAC) in Node.js. It explains the concept of RBAC, its benefits, and walks readers through the process of implementing RBAC in a Node.js application. The post also discusses best practices and security considerations for RBAC implementation.

  8. 8
    Article
    Avatar of devtoDEVยท2y

    Webauth Unlocked: An In-Depth Exploration of Advanced Authentication Solutions

    WebAuthn is an open web authentication standard that allows users to log on to websites and applications without using passwords. It uses biometric data, hardware security keys, or PIN codes for authentication. The registration process involves creating a pair of public and private keys, while authentication requires user confirmation and signature verification. WebAuthn provides a high level of security and prevents unauthorized use of keys. The formats for registration and authorization include various fields such as challenge, rp, user, pubKeyCredParams, timeout, excludeCredentials, authenticatorSelection, attestation, and attestationFormats.

  9. 9
    Article
    Avatar of collectionsCollectionsยท2y

    Implementing Passwordless Authentication with Next.js and React

    Implement passwordless authentication in Next.js using the MojoAuth library for improved security and convenience. Explore the benefits and discover companies already using it.

  10. 10
    Article
    Avatar of cerbosCerbosยท2y

    Authorization vs authentication

    Learn about the difference between authorization and authentication and how they work together to grant access to digital resources.

  11. 11
    Article
    Avatar of freecodecampfreeCodeCampยท2y

    How to Implement JSON Web Tokens (JWTs) in PHP โ€“ PHP Authentication Guide

    Learn how to implement JSON Web Tokens (JWTs) in PHP to enhance authentication and data protection.

  12. 12
    Article
    Avatar of sitepointSitePointยท2y

    Using JSON Web Tokens with Node.js โ€” SitePoint

    Learn about JSON Web Tokens (JWTs) and how they can be implemented for secure authentication in Node.js API. The article covers the process flow of JWT, building a REST API with JWT authentication, and handling common FAQs about JWTs.

  13. 13
    Article
    Avatar of devtoDEVยท2y

    Microsoft Authentication Library Modules

    Learn about the Microsoft identity platform, authentication, and app management tools. Implement user authentication and authorization with the Microsoft identity platform. Authenticate users with Microsoft Entra ID in a Java web app. Get started with Java on Azure and expand the capabilities for Java apps on Azure. Discover best practices for Java apps on Azure.

  14. 14
    Article
    Avatar of gcgitconnectedยท2y

    Build a Complete OpenSource LLM RAG QA Chatbot โ€” ChatEngine

    This post discusses how to build a complete open-source LLM RAG QA chatbot using the ChatEngine logic. It covers implementing chat saving to MongoDB, defining primary entities in the chatbot system, and explaining how the ChatEngine logic works.

  15. 15
    Article
    Avatar of strongdmstrongdmยท2y

    9 User Authentication Methods to Stay Secure in 2024

    Learn about user authentication methods to stay secure in 2024. Discover the importance of user authentication, the limitations of old methods, and the emerging trends in authentication. Explore advanced authentication methods such as multi-factor authentication, token-based authentication, and just-in-time access.

  16. 16
    Article
    Avatar of codemazeCode Mazeยท2y

    How to Use HttpOnly Cookie in .NET Core for Authentication and Refresh Token Actions

    Learn how to use HttpOnly Cookie in .NET Core apps to secure JWT or JSON Web Tokens during authentication and refresh token actions.

  17. 17
    Article
    Avatar of telerikTelerikยท2y

    Using GitHub and NextAuth.js for Single Sign-on in Next.js

    Learn how to implement single sign-on with GitHub and OAuth in Next.js using NextAuth.js for straightforward and secure authentication management.

  18. 18
    Article
    Avatar of supabaseSupabaseยท2y

    Supabase Auth now supports Anonymous Sign-ins

    Supabase Auth now supports anonymous sign-ins, allowing users to create temporary accounts without providing signup credentials. Anonymous users can be restricted in accessing certain features based on Row Level Security policies. Supabase Auth provides methods to convert anonymous users to permanent users by linking email, phone, or OAuth identities.

  19. 19
    Article
    Avatar of hnHacker Newsยท2y

    The Flutter cloud platform

    Celest is a Flutter cloud platform that allows developers to build their backend in Dart without leaving their IDE. It offers features such as serverless functions, authentication, data schema definition, access controls, and content serving. Celest has pricing options for solo developers and teams, with a free tier available.

  20. 20
    Article
    Avatar of syncfusionSyncfusionยท2y

    A Full-Stack Web App Using Angular and GraphQL: Adding Login and Authorization Functionalities (Part 5)

    Learn how to implement user authentication with JWT, role-based authorization, and secure the GraphQL resolver in an Angular and GraphQL web app.