Best of AuthorizationJuly 2023

  1. 1
    Article
    Avatar of permitioPermit.io·3y

    6 Low-Code Tools That Will Make You a Better Frontend Developer

    A developer is measured by their ability to deliver product features in less time while maintaining high code quality. Striking this balance has become more achievable today, thanks to advancements in languages, platforms, CI/CD automation tools, and testing methodologies. We'll explore six low-code tools that can help you become a better frontend developer.

  2. 2
    Article
    Avatar of amplicationAmplication·3y

    Best Practices in Testing GraphQL APIs

    GraphQL is an open-source data query and manipulation language that revolutionizes how applications interact with APIs. With GraphQL, users can request specific data they need and receive only that data in response. This article provides an overview of GraphQL and highlights five best practices for testing GraphQL APIs.

  3. 3
    Article
    Avatar of permitioPermit.io·3y

    Best Practices for Authorization in Python

    Avoid anti-patterns and create better access control with RBAC and ABAC implementations. Use Declarative Policies instead of Imperative Statements. Adopt policy-as-code approaches to define authorization policies. Use a declarative approach to define your authorization policies in a single location.

  4. 4
    Article
    Avatar of permitioPermit.io·3y

    How to Implement RBAC Authorization in FastAPI

    How to implement authorization in FastAPI applications with Permit.io, a permission management system. Follow a step-by-step guide using RBAC and ABAC. FastAPI experienced exponential growth lately among Python application developers. We will go step by step in building an authorization layer into a FastAPI application.

  5. 5
    Article
    Avatar of communityCommunity Picks·3y

    The Complete Guide to Becoming a Web Developer: Part 10

    Web application security is all about protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code. Common targets for web application attacks are content management systems (like WordPress), database administration tools (like phpMyAdmin) and SaaS applications.