Best of AuthenticationMay 2025

  1. 1
    Article
    Avatar of webcraftWebCraft·49w

    The Backend-for-Frontend (BFF) Pattern: Secure Auth Done Right

    The Backend-for-Frontend (BFF) pattern addresses security risks in web applications by storing JWTs server-side in Redis, eliminating exposure to XSS attacks and enhancing session management. This pattern is particularly suited to SPAs and mobile apps, offering improved scalability and user experience with silent token refreshes and instant logouts.

  2. 2
    Article
    Avatar of microservicesioMicroservices.io·47w

    Authentication and authorization in a microservice architecture: Part 2 - Authentication

    Implementing authentication in a microservice architecture can be complex and error-prone. The API Gateway serves as a central point for handling authentication, delegating the process to an identity and access management service for enhanced security. OAuth 2.0 and OpenID Connect protocols are commonly used, with tokens like JWTs facilitating secure communication between client requests and backend services.

  3. 3
    Video
    Avatar of javascriptmasteryJavaScript Mastery·50w

    Build and Deploy a Full Stack Screen Recording & Video Sharing Platform | Next.js, Better Auth

    Learn to create a full stack screen recording and video sharing platform using Next.js and Better Auth for authentication. This guide covers setting up AI-powered transcripts, instant uploads, and privacy controls, while highlighting modern web development tools like TypeScript and Tailwind CSS.

  4. 4
    Article
    Avatar of bytebytegoByteByteGo·47w

    EP164: JWT Simply Explained

    JSON Web Tokens (JWT) provide a secure method for transmitting information between parties using an open standard. They are primarily used for authentication and authorization. A JWT comprises a header, payload, and signature, with two signature types: symmetric and asymmetric, based on the use of secret and public keys. JWTs are integral to modern web applications, ensuring secure data exchange.

  5. 5
    Video
    Avatar of communityCommunity Picks·47w

    Build and Deploy a SaaS AI Agent Platform | Next.js 15, React, Better Auth, Polar | Full Course 2025

    Meet AI is a video calling app powered by AI agents, designed for various roles like language tutors and sales assistants. The app utilizes Next.js, React, and several other technologies for real-time calls, video SDKs, and AI-driven features. The tutorial covers building and deploying the platform, including authentication, payment integrations, and using tools like TRPC, Drizzle ORM, and Open AI.

  6. 6
    Article
    Avatar of freecodecampfreeCodeCamp·49w

    Top Ways Hackers Exploit Web Applications (and How to Prevent Them)

    Web applications, particularly those with user input, are susceptible to attacks like SQL injection, XSS, CSRF, and weak authentication. Developers can mitigate these risks by employing prepared statements for databases, escaping user inputs in HTML, using CSRF tokens, and enforcing strong authentication measures. Regularly updating libraries and ensuring secure configurations are crucial for protecting against vulnerabilities.

  7. 7
    Article
    Avatar of systemdesignnewsSystem Design Newsletter·49w

    The System Design Newsletter

    The post explains the concept of JSON Web Tokens (JWT) and their structure, as well as their role in user authentication and authorization. It highlights the advantages of using JWT in distributed systems for scalability and ease of managing user sessions across servers. The post also addresses potential security risks associated with JWT and offers tips for mitigating these risks.

  8. 8
    Article
    Avatar of neontechNeon·50w

    Postgres 18 Beta Is Out: 7 Features You Should Know About

    Postgres 18 Beta introduces asynchronous I/O for improved performance and throughput, enhanced major version upgrade features, and more detailed EXPLAIN outputs. Additionally, it includes new statistics for vacuum and analyze operations, UUIDv7 generation, parallelizable GIN index builds, and OAuth authentication support. Postgres 18 promises significant performance improvements and operational enhancements for database users.

  9. 9
    Article
    Avatar of awegoAwesome Go·47w

    JSON Web Tokens in Go

    JWT (JSON Web Tokens) is an open standard for securely transmitting information between parties. The guide covers JWT structure (header, payload, signature), explains the difference between symmetric (HS256) and asymmetric (RS256) signing methods, and provides a complete Go implementation using the golang-jwt library and Echo framework. It demonstrates how to generate RSA keys, create a login endpoint that issues JWTs, implement middleware for token verification, and follows security best practices including using RS256 signing and HTTPS.

  10. 10
    Article
    Avatar of betterauthBetter Auth·48w

    Migrating from Clerk to Better Auth

    A comprehensive guide is available for migrating authentication services from Clerk to Better Auth, covering different methods such as password, social, phone-number authentication, and two-factor authentication.

  11. 11
    Video
    Avatar of t3dotggTheo - t3․gg·50w

    Everything is a wrapper now

    Software wrappers are essential layers that improve technology by creating abstractions, enabling portability, flexibility, and ease of use. This concept has powered major innovations, such as C and Java, by simplifying development and supporting multiple environments. Tools like T3 Chat and Clerk utilize wrappers to enhance user experience and functionality without direct backend management.

  12. 12
    Article
    Avatar of lnLaravel News·49w

    Use Passkeys in Your Laravel App

    Laravel Passkeys is a package by Spatie that simplifies setting up passkey authentication in Laravel applications, allowing passwordless login via secure keys stored in apps like 1Password or MacOS password manager. It works with Laravel Livewire and can be customized using Inertia with React or Vue.

  13. 13
    Article
    Avatar of collectionsCollections·47w

    Tesseral: Comprehensive Open Source Authentication Infrastructure for B2B Software

    Tesseral is an open-source authentication platform designed to simplify security processes for B2B and SaaS applications. It offers features like hosted login pages, multi-tenancy support, user impersonation, various login methods, and SAML and SCIM support. Tesseral ensures seamless integration with existing frameworks and enhances security through role-based access control and effective API key management.

  14. 14
    Article
    Avatar of lnLaravel News·47w

    Setup Social Auth Redirects with Laravel Herd

    Setting up social authentication in Laravel Herd can be challenging due to OAuth providers not accepting .test domain callback URLs. The Laravel Herd team offers a solution with fwd.host, a web service acting as a proxy for redirects, enabling the use of social authentication callback URLs. This service forwards authentication requests from fwd.host to your local Herd site without storing data.

  15. 15
    Article
    Avatar of neontechNeon·48w

    Solving the MCP Authentication Headache with Vercel & Better Auth

    The post discusses solving authentication challenges in Model Context Protocol (MCP) implementations using the Vercel MCP adapter package and Better Auth integration. It explains the steps to secure MCP requests in Next.js applications by incorporating OAuth. The author shares their experience implementing this solution in their own project, agenda.dev, emphasizing the ease and efficiency of the process.

  16. 16
    Article
    Avatar of itnextITNEXT·47w

    JSON Web Tokens in Go

    Explore the implementation of JSON Web Tokens (JWT) in Go, covering the structure and use cases of JWTs, such as authorization and information exchange. Learn about the best practices for securely using and managing JWTs, including signing methods like RS256 and securing token transmission. The post also provides a practical guide to setting up a Go server for issuing and verifying JWTs, discussing crucial components such as headers, payloads, signatures, and the JOSE framework.

  17. 17
    Article
    Avatar of ghblogGitHub Blog·49w

    GitHub for Beginners: Building a React App with GitHub Copilot

    Learn to build a frontend React app with GitHub Copilot, integrating authentication and connecting to a backend API for a travel itinerary builder. The tutorial covers setting up a development environment using GitHub Codespaces and developing login, registration, and dashboard components. By leveraging Copilot, users can streamline their development process, enhance collaboration, and add functionalities such as trip management to their application.

  18. 18
    Article
    Avatar of freecodecampfreeCodeCamp·48w

    How Cybercriminals Crack Your Passwords (And How to Stay One Step Ahead)

    This post explains how cybercriminals use techniques like brute force, dictionary attacks, credential stuffing, phishing, and social engineering to crack passwords. It emphasizes the importance of using unique, complex passwords and employing password managers and multi-factor authentication to enhance security. The post highlights the reliance on human error and suggests strategies to prevent unauthorized access, including vigilance against phishing attempts.