Best of Authorization β€” August 2023

  1. 1
    Article
    Avatar of bootcampuxdesignBootcampΒ·3y

    Backend Projects πŸ—οΈ for Transitioning to a Senior-Level πŸ™Œ Developer πŸ§‘β€πŸ’»

    As a backend developer, you play a crucial role in designing and implementing the server-side logic that powers applications. In this article, we will explore a range of project ideas that can help you level up your backend development skills, demonstrate your proficiency in handling advanced concepts, and pave the way for a senior-level developer role.

  2. 2
    Article
    Avatar of asayerasayerΒ·3y

    React: Performing Authentication with JWT

    This article will discuss how to perform JWT authentication in a React app. We will cover the steps involved in setting up a backend JWT endpoint, signing up and signing in from your React app, and protecting routes with JWT validation. You will use a custom-built Express server API to relay the JWT token for a user.

  3. 3
    Article
    Avatar of pointerPointerΒ·3y

    The 10 Types of Authorization

    Each role has a different type of access to a document, and each role is assigned to users on a per-document basis. The way RBAC is normally defined didn’t fit with his use case. That’s because the RBAC definitions online are too high level and imprecise.

  4. 4
    Article
    Avatar of awstipAWS TipΒ·3y

    Laravel Authentication and Authorization: JWT and Policies

    Laravel Authentication and Authorization: JWT and Policies are PHP classes that implements access control and hence authorization by defining authorization logic for a given model or resource. Every content that may be served by an API may be considered as a resource. This includes images as well as data stored in the database.

  5. 5
    Article
    Avatar of permitioPermit.ioΒ·3y

    What is Relationship-Based Access Control (ReBAC)?

    ReBAC is a policy model focused exclusively on relationships, or how resources and identities are connected to each other and between themselves. ReBAC allows us to derive authorization policies based on existing application-level relationships. It's up to developers to pick the most suitable authorization model for their application at each moment in time.