Best of AuthenticationMarch 2025

  1. 1
    Video
    Avatar of asaprogrammerAs a Programmer·1y

    The Ultimate React Native Course in 2025

    This post outlines a comprehensive React Native tutorial to build a real-time social media application called Spotlight. The app features several screens such as authentication, home, bookmarks, post creation, notifications, profile, and others' profiles. It includes Google authentication, real-time updates, and various UI components. The guide is designed for those with basic React knowledge and covers setup with Expo, use of fundamental React Native components, and deployment on both iOS and Android. It also addresses performance optimization and the integration of a backend and authentication using Clerk and Convex.

  2. 2
    Article
    Avatar of laraveldevLaravel Dev·1y

    Laravel Developer Roadmap

    Learn the essential skills and best practices to become a proficient Laravel developer, covering fundamentals such as PHP OOP concepts, routing, middleware, authentication, Blade templating, database management, and testing. Gain insights into advanced topics like performance optimization, REST API development, real-time features, CI/CD, and Laravel ecosystem tools.

  3. 3
    Video
    Avatar of webdevcodyWeb Dev Cody·1y

    The EASIEST Way to Build Mobile Apps (as a Web Developer)

    This post explains how a web developer can easily transition to mobile app development using Expo. It provides a detailed tutorial on building a social media app with Expo, covering account creation, JWT authentication, database setup with Docker, and using Expo’s API routes. It highlights Expo’s developer-friendly features like QR code scanning and local simulations, making mobile app development more accessible and less intimidating.

  4. 4
    Article
    Avatar of awegoAwesome Go·1y

    Session-Based Authentication in Go

    Implementing session-based authentication in Go web applications ensures a secure and efficient user authentication process. This approach involves creating and managing sessions, hashing passwords using bcrypt for security, and adopting best practices to protect against attacks such as session fixation and timing attacks. Key steps include user registration, session management, credential verification, and middleware to protect unauthenticated access.

  5. 5
    Article
    Avatar of opensourcesquadOpen Source·1y

    🚀Exploring authentik: An Open-Source Identity Provider & SSO Solution

    authentik is an open-source Identity Provider and Single Sign-On solution that supports OAuth2, SAML, LDAP, and SCIM. It offers user management, customizable authentication flows, and both admin and user dashboards. It integrates seamlessly into existing infrastructures without significant changes.

  6. 6
    Video
    Avatar of dreamsofcodeDreams of Code·1y

    Rolling my own auth ended up being a mistake...

    Deciding between building or buying an authentication solution, a developer opted to create their own for a custom course platform. Despite good security practices, the time spent handling user flows, password recovery, and account management became overwhelming. Eventually, using the third-party service 'Clark' made the project more manageable, leading to significant time savings and allowing a focus on the core product. Future plans include exploring more flexible authentication options once the course is complete.