Nipun Hegdecodecloudcapital.hashnode.dev·4 hours agoSpring Security Basics: A Simple Guide for NewbiesHey there! Today, we're going to learn about something called Spring Security. Imagine you have a magical castle (your web application) and you want to keep it safe from dragons and trolls (hackers and unauthorized users). Spring Security is like hav...DiscussSpringboot
Sri Durgesh Vsridurgeshv.hashnode.dev·May 17, 2024Enhancing Security in Your E-Commerce Platform: Integrating AWS Cognito with Your React Application [Part - 1]Introduction: Welcome back to my journey of architecting the future of e-commerce In this installment, I delve into the cornerstone of user trust and security: authentication. Join me as I explore the intricacies of implementing user authentication u...Discuss·10 likesAWS
CerbosforCerbos's team blogcerbosdev.hashnode.dev·May 15, 2024The Hidden Costs of User AuthorizationAuthentication and authorization are the two central pillars of security of any application. Authentication is the identification of valid users and authorization is the process of determining what those users are allowed to do. User authorization pl...Discussauthentication
utsab sapkotautsabsapkota.hashnode.dev·May 15, 2024Add new user in Kubernetes clusterAdding users to a Kubernetes cluster is crucial for managing access control, enhancing security, and ensuring efficient operations. By incorporating Role-Based Access Control (RBAC), you can define and enforce specific permissions for each user, main...DiscussKubernetes
Zihan Linkuruxxii.hashnode.dev·May 15, 2024Sessions in ExpressIntroduction In order to implement sessions within an Express application, we can use the NPM module, express-session, as a middleware. The session middleware typically handles the creation, retrieval, and management of the session data, which is usu...Discuss·1 likesoftware development
Cloud Tunedcloudtuned.hashnode.dev·May 14, 2024Daily Hack #day41 - Online JWT DecoderJWT, short for JSON Web Token, is a compact, URL-safe means of representing claims securely between two parties. It's commonly used for authentication and information exchange in web applications. JSON Web Tokens (JWT) are a widely adopted method for...DiscussDaily HacksJWT
Ekemini Samuelenvitab.hashnode.dev·May 14, 2024Integration of Facial Authentication (Recognition) on an Employee Dashboard using FACEIO, Next.js & Typescript.While there are different authentication methods, Facial Authentication adds a higher level of security. In this tutorial, we'll integrate Facial Authentication with FACEIO to an employee dashboard sign-up page. At the end of this project, you can si...Discussauthentication
Adeoye Davidoluferanmidavid.hashnode.dev·May 13, 2024Mastering the Art of API Documentation: Best Practices and Pitfalls to AvoidIntroduction API documentation serves as a crucial bridge between developers and the functionality of software systems. It provides clear guidance on how to interact with an application's backend services, enabling seamless integration into various p...Discuss·10 likesRequest methods
Keith CaseyforPangea Blogpangea.cloud·May 13, 2024Do Passkeys Solve the Deployability Issue?I’ve lost count of how many RSA Tokens, Yubikeys, and the like I’ve collected, lost, misplaced, replaced, and cursed over the years. While they’re exceptionally secure, they’re a pain for both administrators to deploy and users to keep track of. Eith...Discussauthentication
Zihan Linkuruxxii.hashnode.dev·May 13, 2024JSON Web Tokens (JWTs)What is a JWT? JSON Web Tokens are self-contained JSON objects that compactly and securely transmit information between two parties. They are secure because they are digitally signed using a secret or a public/private key pair. Components of a JWT A ...Discuss·1 likeWeb Development