Best of AuthorizationJanuary 2024

  1. 1
    Article
    Avatar of permitioPermit.io·2y

    OAuth vs. JWT: Differences in Application Authentication and Authorization

    Explore the differences between OAuth and JWT in web app security and their importance in modern web development.

  2. 2
    Article
    Avatar of devtoDEV·2y

    Modeling Authorization in Prisma - No Theory, Just Code

    This post provides examples of different authorization patterns using Prisma and ZenStack. It covers the Access Control List (ACL), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and multi-tenancy patterns. The examples show how to implement these patterns and highlight the benefits of using ZenStack for declarative authorization rules.

  3. 3
    Article
    Avatar of freecodecampfreeCodeCamp·2y

    How to Set Up Authentication in Your Apps with Supabase Auth

    Learn about authentication and authorization concepts, session management with tokens and cookies, common authentication strategies, and how to use Supabase Auth.

  4. 4
    Article
    Avatar of securityboulevardSecurity Boulevard·2y

    How to secure APIs built with Express.js

    Learn how to secure your Express.js APIs with tips on handling user input, implementing authentication and authorization, preventing security threats like XSS and SQL injection, and following best practices for Express.js security.

  5. 5
    Article
    Avatar of permitioPermit.io·2y

    The Definitive Guide to OAuth Tokens

    Explore the guide to OAuth Tokens and learn about Access Tokens and Refresh Tokens for secure user authentication and authorization.

  6. 6
    Article
    Avatar of permitioPermit.io·2y

    An Introduction to Role Based Access Control (RBAC): From Basics to Advanced Implementation

    Explore the fundamentals of Role Based Access Control (RBAC), its benefits, challenges, and alternatives for effective user permission management and application security.