Best of Authorization β€” 2023

  1. 1
    Article
    Avatar of bootcampuxdesignBootcampΒ·3y

    Backend Projects πŸ—οΈ for Transitioning to a Senior-Level πŸ™Œ Developer πŸ§‘β€πŸ’»

    As a backend developer, you play a crucial role in designing and implementing the server-side logic that powers applications. In this article, we will explore a range of project ideas that can help you level up your backend development skills, demonstrate your proficiency in handling advanced concepts, and pave the way for a senior-level developer role.

  2. 2
    Article
    Avatar of permitioPermit.ioΒ·3y

    6 Low-Code Tools That Will Make You a Better Frontend Developer

    A developer is measured by their ability to deliver product features in less time while maintaining high code quality. Striking this balance has become more achievable today, thanks to advancements in languages, platforms, CI/CD automation tools, and testing methodologies. We'll explore six low-code tools that can help you become a better frontend developer.

  3. 3
    Article
    Avatar of bytebytegoByteByteGoΒ·3y

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1. We discuss the problems each method solves and how to choose the right authentication method for our needs. The diagram below shows where these methods apply in a typical website architecture and their meanings.

  4. 4
    Article
    Avatar of infosecwriteupsInfoSec Write-upsΒ·3y

    API Security for Developers

    This post provides a high-level checklist for developers to securely develop APIs, covering all OWASP Top 10 API security issues. It emphasizes the importance of secure APIs and the risks they pose. The checklist includes recommendations for broken object-level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfiguration, injection, improper assets management, and insufficient logging and monitoring.

  5. 5
    Article
    Avatar of permitioPermit.ioΒ·3y

    AuthN vs. AuthZ: Understanding the Difference

    Authentication is the process of verifying the identity of a user or entity, while authorization is the process of granting or denying access to specific resources based on a user's verified identity. Authentication methods include username and password, and biometric authentication. Authorization is managed through policies, such as Role Based Access Control and Attribute Based Access Control.

  6. 6
    Article
    Avatar of asayerasayerΒ·3y

    React: Performing Authentication with JWT

    This article will discuss how to perform JWT authentication in a React app. We will cover the steps involved in setting up a backend JWT endpoint, signing up and signing in from your React app, and protecting routes with JWT validation. You will use a custom-built Express server API to relay the JWT token for a user.

  7. 7
    Article
    Avatar of bytebytegoByteByteGoΒ·3y

    EP75: How Does A Password Manager Work

    This week’s system design refresher: Top 5 Most Used Architecture Patterns. How does a Password Manager work? Implement passkey authentication in minutes (Sponsored) Join TikTok, Paypal, Google, and other leading tech companies by giving your users a faster and more secure sign-in experience with passkeys.

  8. 8
    Article
    Avatar of freecodecampfreeCodeCampΒ·2y

    What is an API Gateway and Why is it Useful?

    An API gateway is a fully managed service that simplifies the process of creating, publishing, maintaining, monitoring, and securing APIs. It acts as a middleman between clients and backend services, handling request validation, authorization, rate limiting, request routing, and request/response transformation. It is particularly useful in microservice architectures.

  9. 9
    Article
    Avatar of permitioPermit.ioΒ·3y

    Send SMS Directly from the Browser (No Backend Code Required!)

    We'll learn how to send SMS directly from the browser using Frontend Only Authorization (FoAz) standard. To authenticate our users in the browser, we'll use Clerk.dev, a frontend-first authentication platform that lets you add authentication to your application in minutes. Let's create a new React app by using Vite.

  10. 10
    Article
    Avatar of permitioPermit.ioΒ·2y

    What is Token-Based Authentication?

    Explore the concept of token-based authentication, including its advantages over sessions, the different types of tokens used, and the mechanics of how it works.

  11. 11
    Article
    Avatar of communityCommunity PicksΒ·3y

    Next.js User Authentication and Authorization

    Learn how to implement secure user authentication and authorization in your Next.js app using NextAuth.js, a library that simplifies the process and provides various authentication providers and methods.

  12. 12
    Article
    Avatar of permitioPermit.ioΒ·3y

    How to build authorization like Netflix with Open Source?

    Learn how Netflix solved the challenge of authorizing millions of users by using OPA, and discover how you can implement a similar solution.

  13. 13
    Article
    Avatar of amplicationAmplicationΒ·3y

    Best Practices in Testing GraphQL APIs

    GraphQL is an open-source data query and manipulation language that revolutionizes how applications interact with APIs. With GraphQL, users can request specific data they need and receive only that data in response. This article provides an overview of GraphQL and highlights five best practices for testing GraphQL APIs.

  14. 14
    Article
    Avatar of attiAT&T IsraelΒ·3y

    Authentication & Authorization using React, NestJS & JWT Token

    Authentication & Authorization using React, NestJS & JWT Token using NestJS, Passport and JWT libraries for the server side, React, and Redux toolkit (RTK query) for the client side. The article also includes detailed code examples to demonstrate how to implement authentication techniques in practice using JWT token.

  15. 15
    Article
    Avatar of snykSnykΒ·2y

    Top 3 security best practices for handling JWTs

    Ensure the security of your web applications by following the top 3 security best practices for handling JWTs. Keep JWTs secret, validate them properly, and set expiration times to prevent vulnerabilities and breaches. Use tools like Snyk to identify and remediate security issues related to JWTs.

  16. 16
    Article
    Avatar of newstackThe New StackΒ·3y

    5 Best Practices for Securing Your API Gateway

    Learn about five best practices for securing your API gateway, including token-based authentication, role-based access control, rate limiting, explicit CORS policy, and real-time monitoring and alerting for anomalies.

  17. 17
    Article
    Avatar of permitioPermit.ioΒ·2y

    12 Open Source Auth Tools That Will Help You Build Better Applications

    Discover top open-source auth projects enhancing application security, including Hanko, Supabase, and OPAL, for robust authentication and authorization.

  18. 18
    Article
    Avatar of pointerPointerΒ·3y

    The 10 Types of Authorization

    Each role has a different type of access to a document, and each role is assigned to users on a per-document basis. The way RBAC is normally defined didn’t fit with his use case. That’s because the RBAC definitions online are too high level and imprecise.

  19. 19
    Article
    Avatar of permitioPermit.ioΒ·2y

    Building Healthcare App Authorization in Space with Next.js and Permit.io

    Learn how to implement proper authorization for a healthcare app with the help of Galactic Health Corporation, a Rick & Morty inspired healthcare application.

  20. 20
    Article
    Avatar of permitioPermit.ioΒ·3y

    Next.js Passwordless Authentication with SuperTokens & Twilio

    Passwordless authentication replaces traditional login methods with secure alternatives, like one-time passwords or biometrics. This approach simplifies the login process and enhances security by eliminating the need to remember and manage passwords. In this tutorial, we’ll learn how to set up SuperTokens Passwordless Authentication and How to implement basic authorization with Permit.

  21. 21
    Article
    Avatar of javacodegeeksJava Code GeeksΒ·3y

    RESTful Architecture Cheatsheet

    RESTful architecture is a scalable and interoperable approach for building web services. It offers benefits such as scalability, interoperability, simplicity, flexibility, and security. The HTTP verbs used in RESTful architecture are GET, POST, PUT, DELETE, HEAD, OPTIONS, PATCH, CONNECT, TRACE, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, and LOCK. Resources in a RESTful API are identified using unique URIs, and plural noun conventions are often used for collections. Authentication and authorization are important aspects of securing RESTful APIs, and various mechanisms such as Basic Auth, OAuth, and RBAC can be used.

  22. 22
    Article
    Avatar of permitioPermit.ioΒ·3y

    Introducing FoAz: Frontend-only-Authorization

    FoAz is designed to solve two key problems faced by modern application developers. It allows developers to "slap on permissions" on existing services that don't have an authorization layer yet, require better policy models. FoAz acts as a proxy service that accepts incoming API calls from the frontend.

  23. 23
    Article
    Avatar of infosecwriteupsInfoSec Write-upsΒ·3y

    OAuth 2.0 Hacking πŸ’Έ

    OAuth 2.0 Hacking is an open authorization protocol. It allows sharing of resources stored on one site to another site without using their credentials. It uses username and password tokens instead of credentials. The resource owner is the user/entity granting access to their protected resource, such as Twitter account Tweets.

  24. 24
    Article
    Avatar of permitioPermit.ioΒ·3y

    Best Practices for Authorization in Microservices

    In a monolithic architecture, a single authorization point typically controls access to all resources. In a microservice architecture, it's common to embed the authorization logic in the application code itself. Decentralizing the PDPs reduces the impact of any failures, increases availability, and enables horizontal scaling of the authorization process.

  25. 25
    Article
    Avatar of logrocketLogRocketΒ·3y

    NestJS interceptors: Guide and use cases

    NestJS interceptors are class-annotated with injectable decorators and implement the interface. They are called before sending the request to a controller, while the method is called after the request has been processed by the controller and a response is returned. In the interceptor, we can do any processes and modify the request.