Best of Authentication — May 2024
- 1
- 2
- 3
- 4
- 5
LogRocket·2y
Using Rust and Axum to build a JWT authentication API
Learn how to build a JWT authentication API using Rust and the Axum framework. The tutorial covers installing Rust, Axum, and necessary dependencies, creating authentication endpoints and implementing JWT middleware for protected routes.
- 6
Community Picks·2y
The Open-Source Framework For B2B Apps
Build API-based applications using modern React and Material Design. React-admin is easy to learn, robust, stable, and a joy to code with. It handles common features and offers a vast library of hooks and components. React-admin is backend agnostic and supports various REST and GraphQL backends as well as third-party authentication. Testimonials from satisfied users are included.
- 7
- 8
- 9
asayer·2y
How does Single Sign On work?
Single Sign-on (SSO) is an authentication procedure that simplifies user logging in, reduces password fatigue, reduces IT costs, improves management control, enhances user productivity, and simplifies administration. However, SSO also poses security risks and can be a single point of failure. There are different types of SSO protocols, including SAML, OAuth, OpenID Connect, and Kerberos.
- 10
asayer·2y
Authentication and Authorization with SSR in Next.js
This post discusses authentication and authorization in Next.js using SSR. It covers the different approaches to authentication in Next.js, highlights the use of NextAuth.js for handling authentication and authorization, and explains how role-based authorization can be implemented with SSR in Next.js.
- 11
- 12
- 13
- 14
codeHeim·2y
#36 Golang - Mastering JWT Authentication
Learn how to implement JWT authentication in a Go application using Golang, Gin Gonic, and Gorm. Discover how JWT tokens can be used to securely transmit information between parties in authentication. Restrict access to web pages using JWT authentication.
- 15
- 16
- 17
- 18
- 19
Cerbos·2y
OpenID Foundation AuthZEN Working Group Announces Interop Results
The OpenID Foundation AuthZEN Working Group announced that leading authorization vendors achieved conformance with the AuthZEN request/response protocol, bringing interoperability and standardization to the authorization market. The group aims to simplify the implementation of a robust authorization layer and improve interoperability in authorization.
- 20
Hacker News·2y
Should I Use JWTs For Authentication Tokens?
JWTs are designed for Google/Facebook scale environments and have tradeoffs that may not be necessary for smaller applications that need to hit the database on each request. Using a normal session mechanism and storing the session data in the database may be a better choice.
- 21
- 22
asayer·2y
Leveraging Nuxt.js' Middleware for Routing and Authentication
Learn how to leverage Nuxt.js' middleware for routing and authentication to improve application security. Explore different types of route middleware in Nuxt.js and understand how to implement global middleware. Discover best practices for utilizing middleware in your applications.
- 23
- 24
Halodoc·2y
Passwordless Authentication Using Passkey
Passwordless authentication using passkey offers a secure and cost-effective solution for user access. Passkeys serve as an alternative to passwords and utilize security features in user devices. Passkey authentication mitigates vulnerabilities associated with traditional authentication methods and streamlines user experience.
- 25
Netguru·2y
7 Rules for Securing Mobile App Development: A Comprehensive Guide
Learn 7 fundamental practices for securing mobile app development and protecting sensitive information. Understand the business context, identify key security mechanisms, know your limits, don't believe in magic solutions, stay agile, keep up with trends, and ensure post-work clean-up of sensitive data.