Roshan Shrestharosan-shrestha.com.np·Nov 13, 2024Authentication vs. AuthorizationIntroduction: Authentication and Authorization are two critical terms that form the backbone of security on the internet. Together, they help protect our personal information, prevent unauthorized access, and ensure that only trusted users can access...Discuss·3 likes·52 readsOAuthoauth
Babatunde Ogunbiyiyungzee.hashnode.dev·Sep 25, 2024Auth: Difference Between Authentication and Authorization.In web development, authentication and authorization are two critical concepts that govern access to resources and functionalities in a system, but they address different aspects of security. 1. Authentication Authentication is the process of verifyi...Discussauthentication
Darko Bozhinovskidarkob.hashnode.dev·Aug 8, 2024"BuT, aUtH iS HaRd"I'm "I've used MD5 to hash passwords in PHP" years old. Sure, it was a horrible idea, even back in 2012. But, back then, I don't remember considering auth "hard." It was a pretty straightforward ordeal by itself - get an email or a username, get a pa...DiscussAuth
Vivekheyvivek.com·Jul 30, 2024Why You Should Avoid Storing Authentication Tokens in Local Storage 🚫🔑In the realm of web development, securely managing authentication tokens is crucial for protecting user data and maintaining application integrity. A common approach for storing these tokens is using localStorage due to its simplicity and ease of use...Discuss·11 likes·170 readsauthentication
Archit Chhajedarchit108.hashnode.dev·Jun 16, 2024Access And Refresh Tokens Explained Simply!So, you might have heard if Access and Refresh tokens of you've ever studied about web-authentication and user authorization. But many people get confused as to what exactly are they? Why do we need them? Why can't we have only 1 token and authorize ...Discuss·1 like·37 readsaccess-token
Hemin Panchalhemin-panchal.hashnode.dev·May 6, 2024Understanding JWT Tokens: A Comprehensive GuideIntroduction In the ever-evolving landscape of web development and cybersecurity, ensuring secure and efficient communication between clients and servers is paramount. One tool that has gained significant traction in this realm is JSON Web Tokens (JW...DiscussJWT
Jihwan ParkforComit Dev Teamblog.skku-comit.dev·Dec 27, 2023[Authentication] Session vs JWT1. 쓰는 이유 주변에서 토큰 기반 인증을 많이 사용해서 평소 사용자 인증 기능을 구현할 때 JWT 인증을 주로 사용했다. 그러나 백엔드 기초 강의를 보면 세션 (session) 기반 인증을 사용하는 경우도 종종 있다. 그래서 궁금했다. 1) 두 가지 인증 방식은 어떤 차이가 있고, 2) 각각 어떤 경우에 사용하는 게 적절한 것인지. 2. 본문 개념 이해 Session 세션에 사용자 정보를 담아서 데이터베이스에 저장하고, 쿠키를 통해...Discussauthentication
ChristosProdartling.dev·Dec 22, 2023Passwordless login in Flutter via email OTP with Supabase AuthIntroduction If your mobile or web app requires user management, you're going to need a way for your users to sign up. By now, developers do not try to reinvent the wheel and write their own auth solutions, and can either use self-hosted or managed a...Discuss·1 like·1.3K readsDart
Nikhil AkkiPronikhilakki.in·Dec 2, 2023Understanding Authentication and Authorization in Software DevelopmentIntroduction In the intricate realm of software development, authentication and authorization play pivotal roles in securing digital landscapes. As gatekeepers of access, they define who gets in and what they can do once inside. This blog unravels th...Discuss·1 like·89 readsauthentication
FusionAuth teamforFusionAuth Blogfusionauth.hashnode.dev·Nov 17, 2023I Just Want Authentication To WorkAuthentication is the process of verifying the identity of a user or entity. It is a fundamental security measure that is used in a wide variety of applications, including web applications, mobile apps, and APIs. The thing is, as a developer with ove...Discussauthentication