Best of AuthenticationApril 2025

  1. 1
    Article
    Avatar of microservicesioMicroservices.io·52w

    Authentication and authorization in a microservice architecture: Part 1 - Introduction

    This post introduces the concepts of authentication and authorization in a microservice architecture. It discusses the challenges of implementing these in distributed systems, contrasting with simpler monolithic systems. Various authorization models like RBAC, ReBAC, and ABAC are explained using a fictional application, RealGuard.io, to illustrate the complexities and potential solutions in both monolithic and microservices environments.

  2. 2
    Video
    Avatar of awesome-codingAwesome·1y

    The easiest way to build apps... Seriously.

    Mobile app development has evolved, enabling developers to build native apps for iOS and Android using JavaScript through Expo. Expo simplifies the setup and provides a managed runtime, native APIs, a zero-config CLI, and cloud-built tools. It supports over-the-air updates and seamless integration of authentication services like Clerk. This makes the cross-platform development process much more efficient and less painful.

  3. 3
    Article
    Avatar of phProduct Hunt·1y

    Trueguard - Stop fake user signups

    Trueguard offers advanced protection for SaaS applications by automatically blocking temporary emails, free-tier abusers, and automated bots, ensuring that malicious users are kept at bay.

  4. 4
    Video
    Avatar of bytegradByteGrad·1y

    Always Use DAL Authentication In Next.js (Data Access Layer)

    Discusses the importance of using a data access layer (DAL) for enhancing authentication and data security in Next.js applications. Covers the potential risks of relying solely on middleware or page component for authentication, and explains how integrating a DAL can provide a more robust and secure solution. Offers practical examples and tips on implementing DAL while highlighting the benefits and some limitations of this approach.

  5. 5
    Article
    Avatar of fusionauthFusionAuth·1y

    What are JSON Web Tokens (JWTs)?

    JSON Web Tokens (JWTs) provide a secure method for transmitting data between an authentication server and an application. Learn the details in this short video.

  6. 6
    Article
    Avatar of fusionauthFusionAuth·1y

    NEW - Auth LLM

    Universal Authentication has been launched, offering an advanced tool that understands user behavior deeply. A demo is available to explore its features and learn more about its functionality.

  7. 7
    Video
    Avatar of jherrJack Herrington·1y

    Better-Auth: Headless Authentication for Your TanStack Start App

    Learn how to add authentication to a TanStack Start application using Better-Auth. This guide covers the setup process, including signing in and out, authenticating routes, and handling API and TRPC routes. The tutorial also explains how to set up social logins with GitHub and discusses creating secure routes and server functions.

  8. 8
    Article
    Avatar of communityCommunity Picks·1y

    RvDstudio/nextjs_drizzle_better-auth: A Next.js starter kit integrating Drizzle ORM for type-safe database operations, Better Auth for secure authentication, and NeonDB for serverless PostgreSQL. This

    A Next.js starter kit that integrates Drizzle ORM for type-safe database operations, Better Auth for secure authentication, and NeonDB for serverless PostgreSQL. Instructions are provided for setting up dependencies, environment variables, and generating the necessary schema files.

  9. 9
    Video
    Avatar of netninjaNet Ninja·52w

    Complete React Native Tutorial #12 - Backend Setup with Appwrite

    Learn how to set up a backend for a React Native application using Appwrite, a backend-as-a-service platform. This tutorial covers creating an Appwrite account, setting up a project, registering a platform, and integrating the backend services like authentication and database into a React Native app.

  10. 10
    Article
    Avatar of trendyoltechTrendyol Tech·52w

    Strengthening Influencer Verification with New Instagram Login API

    Trendyol Tech has enhanced influencer verification by integrating Instagram Login API to prevent fraudulent applications. The implementation faced challenges such as OAuth incompatibility and the need to move login flows outside iframes. The process involved a thorough App Review and business verification for production use. Key improvements included better user experience and automated filtering of ineligible applicants. Ultimately, this integration not only addressed fake applications but also laid the foundation for a more robust influencer platform.