Best of AuthenticationJanuary 2025

  1. 1
    Article
    Avatar of gitguardianGitGuardian·1y

    Authentication and Authorization Best Practices

    Authentication verifies the identity of a user making an API request, while authorization determines if the user has permission to access a specific API. Various methods such as basic auth, API keys, JWT, and OAuth have their use cases and best practices. These include using HTTPS, secure storage, least privilege principle, and regular security audits. Common mistakes to avoid involve using HTTP, storing API keys in code, and ignoring input validation.

  2. 2
    Video
    Avatar of bytegradByteGrad·1y

    Next.js 15 Authentication COMPLETE Guide (+ Best Practices, Pitfalls)

    This post provides a comprehensive guide on implementing authentication in Next.js 15, emphasizing server-side security, proper use of cookies and tokens, and the importance of roles and permissions. It highlights best practices and pitfalls to avoid when using server components and middleware to protect routes and actions. Additionally, it underscores the benefits of using third-party services for authentication to avoid errors and save development time.

  3. 3
    Article
    Avatar of bytebytegoByteByteGo·1y

    EP146: The Open Source AI Stack

    The open-source AI stack provides numerous tools and frameworks across various components including Frontend, Embeddings, Backend, Data Retrieval, and Large-Language Models, making AI development accessible without heavy costs. Important algorithms for system design interviews and comparisons of authentication methods like Cookies, Sessions, JWT, and PASETO are discussed. Additionally, TikTok's approach to managing a 200K file frontend MonoRepo with the Sparo tool highlights significant performance optimizations in Git operations.

  4. 4
    Article
    Avatar of communityCommunity Picks·1y

    Bati

    A comprehensive guide to building a full-stack application with data fetching, authentication, database integration, and server setup.

  5. 5
    Video
    Avatar of asaprogrammerAs a Programmer·1y

    Next.js Tutorial 2025 - Build a Full Stack Social App with React & Next.js

    Learn to build a full stack social media application using React and Next.js. This detailed guide covers implementing core features like user authentication with Clerk, post creation, comments, likes, and notifications. The project also includes updating profiles, enabling dark mode, and ensuring a responsive UI design with Tailwind CSS. You will also integrate a PostgreSQL database using Prisma ORM and Neon, demonstrating key functionalities step-by-step.

  6. 6
    Article
    Avatar of javarevisitedJavarevisited·1y

    JWT Authentication with Spring 6 Security

    Learn how to implement JWT authentication with Spring 6 Security using best practices. This guide walks through setting up a Spring Boot project, configuring JWT authentication, and integrating MongoDB for user data. It covers creating JWT tokens, adding security configurations, and testing endpoints. The aim is to secure a social media app with user authentication and authorization.

  7. 7
    Article
    Avatar of laravelkidsLaravel Kids·1y

    Implement RBAC with Laravel

    Briefly introduces an effective method for implementing Role-Based Access Control (RBAC) in Laravel and includes a helpful YouTube tutorial link.

  8. 8
    Article
    Avatar of securityboulevardSecurity Boulevard·1y

    Authentication and Single Sign-On: Essential Technical Foundations

    Authentication and Single Sign-On (SSO) are crucial for modern web security. Implementing these effectively requires understanding essential technologies and security concepts such as HTTP, cookies, session management, database security, XSS, CSRF, and CORS. By grasping the technical foundations and best practices in these areas, developers can create secure authentication systems. Key practices include using secure cookies, preventing SQL injection and XSS attacks, managing sessions properly, and configuring CORS correctly. Comprehensive security involves layered approaches, including strong password policies and regular security audits.

  9. 9
    Article
    Avatar of frontend_developerFrontend developer·1y

    Add authentication to your Next.js app in 100 seconds with Clerk 😲😱

    Learn how to quickly add Google authentication to your Next.js app using Clerk. The guide covers adding a user button for profile management and enabling Google One Tap, making it easier to authenticate and manage users.

  10. 10
    Article
    Avatar of baeldungBaeldung·1y

    A Guide to One-Time Token Login in Spring Security

    One-time token login (OTT) in Spring Boot applications helps balance ease of use and security, ideal for infrequent logins. It simplifies authentication by sending a time-limited token via email or SMS for user login instead of traditional passwords. The tutorial covers implementing OTT with Spring Boot and Spring Security, including necessary configurations, token generation, and delivery methods, concluding with manual and automated testing guidelines.

  11. 11
    Article
    Avatar of amandeep58Backend Developer·1y

    Database less OTP- A concept

    The post explains how an OTP system typically works and proposes a concept for a database-less OTP system using hashing and JSON Web Tokens (JWT) to reduce costs. It suggests creating a raw OTP sent to the user and a corresponding hashed OTP shared with the user's browser. This approach can prevent database dependency while maintaining security. A demo and GitHub repositories for the backend and frontend implementations are provided.

  12. 12
    Article
    Avatar of asayerasayer·1y

    How to Create Secure Tokens with a Token Generator

    Generating secure tokens is crucial for authentication, API protection, and session management in modern software development. Token generators automate this process, creating cryptographically secure tokens that are resistant to attacks. These tools save time, enhance security, and offer customization options for token properties. Key practices for using tokens include secure storage, transmitting over HTTPS, and periodic rotation.

  13. 13
    Article
    Avatar of laravelkidsLaravel Kids·1y

    Social Login (Facebook/Google) with API

    Learn how to integrate social login using Facebook and Google with a Laravel API, including the necessary steps and considerations for implementation.

  14. 14
    Article
    Avatar of logrocketLogRocket·1y

    Using Firebase for ASP.NET authentication

    Combining Firebase and ASP.NET can create a secure and high-performing web application. This guide provides an end-to-end solution for securing APIs, enabling interactive login functionality, and handling access and refresh tokens. The step-by-step instructions include setting up Firebase, configuring ASP.NET authentication, validating JWTs, and integrating a demo Angular frontend to use the authentication system. By following these steps, you can create a seamless and secure authentication system for your web application.

  15. 15
    Article
    Avatar of nordicapisNordic APIs·1y

    How Passwordless Logins Improve API Security

    Passwordless logins are gaining traction due to their enhanced security, ease of use, and cost-effectiveness. They reduce the risks associated with leaked credentials and user error, improve the monitoring of unauthorized access, and offer resistance against AI-driven cyberattacks. Biometric data and device-based authentication are more secure alternatives. Additionally, organizations can save significant resources by reducing password-related requests, which enables better allocation of time and money for other cybersecurity measures.

  16. 16
    Video
    Avatar of laraveldailyLaravel Daily·1y

    NEW Laravel OTPz Package: Login Form with No Password

    Learn about a new Laravel package called OTPz, which allows users to log in without a password using one-time passwords. The package simplifies integration with Laravel Breeze and Inertia, and uses Mailtrap for virtual inbox services. The post explores its features, installation process, and customization options.