Best of AuthorizationSeptember 2023

  1. 1
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP75: How Does A Password Manager Work

    This week’s system design refresher: Top 5 Most Used Architecture Patterns. How does a Password Manager work? Implement passkey authentication in minutes (Sponsored) Join TikTok, Paypal, Google, and other leading tech companies by giving your users a faster and more secure sign-in experience with passkeys.

  2. 2
    Article
    Avatar of newstackThe New Stack·3y

    5 Best Practices for Securing Your API Gateway

    Learn about five best practices for securing your API gateway, including token-based authentication, role-based access control, rate limiting, explicit CORS policy, and real-time monitoring and alerting for anomalies.

  3. 3
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    OAuth 2.0 Hacking 💸

    OAuth 2.0 Hacking is an open authorization protocol. It allows sharing of resources stored on one site to another site without using their credentials. It uses username and password tokens instead of credentials. The resource owner is the user/entity granting access to their protected resource, such as Twitter account Tweets.

  4. 4
    Article
    Avatar of permitioPermit.io·3y

    401 vs. 403 Error Codes: What's the Difference? When to Use Each? (Updated 2023)

    Learn about the differences between 401 and 403 error codes. Understand when and how to use each code for authentication and authorization purposes.

  5. 5
    Article
    Avatar of newstackThe New Stack·3y

    Secure Go APIs with Decentralized Identity Tokens, Part 1

    The rise of decentralized identity tokens adds a new dimension to API security. Traditionally, API authentication and authorization relied heavily on centralized identity providers. Decentralized identity tokens allow individuals to have greater control over their identities and authenticate themselves without relying on central authority.

  6. 6
    Article
    Avatar of permitioPermit.io·3y

    You're Doing Shift-Left Wrong

    You're Doing Shift-Left Wrong. Learn how to shift left in a method that will impact the product's security. Avoid friction between security and development teams.

  7. 7
    Article
    Avatar of permitioPermit.io·3y

    Role-Based Access Control (RBAC) VS. Relationship-Based Access Control (ReBAC)

    In this article, we will dive into two common authorization models - RBAC and ReBAC. We will discuss their pros and cons, and try to guide you in the decision of which one is right for your application. In this blog, we'll explore and compare two commonly used models: Role-Based Access Control (RBAC) and Relationship-Basedaccess Control (ReBAC)