harsha dattaforharsha dattaharshadatta.hashnode.dev路Oct 2, 2023Top 4 Forms of Authentication MechanismsIn today's digital world, it's crucial to protect our online stuff. One way to do this is with special tools called authentication methods. These are like secret keys that let you in and keep others out. Let's look at four easy-to-understand ways: 1....Discussauthentication
Sauradip Ghoshbasiclinuxcommands.hashnode.dev路Sep 25, 2023A Beginner's Guide to Using Auth0Authentication and authorization are critical aspects of modern web and mobile applications. They ensure that only authorized users can access your application's resources, protecting sensitive data and enhancing user experience. Auth0 is a popular i...DiscussAuth0
Joseph Lweyalweyajoe.hashnode.dev路Sep 13, 2023My Portfolio Project Journey: Trials, Triumphs, and LearningIntro In the ever-evolving landscape of technology and innovation, I embarked on a personal journey to create a portfolio project that would not only showcase my skills but also address a real-world need. My project aimed to bridge the gap between jo...Discuss路1 likeFrontend Development
Matt MulvaneyforHot off the Application Expressmattmulvaney.hashnode.dev路Aug 22, 2023Incorporating AUTH0 Actions with APEX AuthenticationWhen opening Social Sign in to your application, you are opening up a wide audience of potential connections. What if you want to control access om some way? There are two solutions here: 1) Control everything in PL/SQL using the API in the Post Auth...Discuss路1 like路129 readsorclapex
Fenil ModiforFenil Modifenilmodi.hashnode.dev路Jan 6, 2023How to Add Auth0 to Your Next.js ApplicationNext.js is a React framework that allows you to build many types of applications, while allowing you to use techniques like server-side rendering or static site generation. Authentication and Authorization are important features to ensure that users ...Discuss路10 likesAuth0
Fenil ModiforFenil Modifenilmodi.hashnode.dev路Aug 12, 2023How to use Auth0 to protect your APIsAs the usage of APIs has grown, so have security concerns surrounding them. It is crucial to safeguard APIs against unauthorized access, hacking, and data breaches. AuthO, a third-party authentication and authorization platform, offers an easy way to...DiscussAuth0
Dennis von der BeyforQourses Blogblog.qours.es路Jul 30, 2023馃摑 Ship logs from Auth0 to BetterStack Logs with TerraformLearn how to integrate Auth0 monitoring logs into your logging stack effortlessly using BetterStack Logs and Terraform. By connecting Auth0's log events to BetterStack Logs with HTTP webhooks, you'll have a robust logging system ready in no time. Let...Discuss路64 readsAuth0
Matt MulvaneyforHot off the Application Expressmattmulvaney.hashnode.dev路Jul 20, 2023Auth0 Authentication with APEXAuth0 is a cutting-edge authentication platform with a cool free option. It offers social logins, multi-factor authentication, and user management for startups and small projects, delivering robust security and a seamless login experience. You can us...Discuss路2 likes路456 readsorclapex
TECHcommunity_SAGtechcommsag.hashnode.dev路Jun 7, 2023How to simplify login authentication when switching between multiple tenants/subtenantsIntroduction Imagine that you are an administrator of a Cumulocity IoT platform with one management tenant and multiple subtenants. Your job is to manage and monitor these tenants. You set up a Data broker to forward the required data from the subten...Discussiot
Aakash Goplaniblog.aakashgoplani.in路Jun 4, 2023SvelteKit Authentication using SvelteKitAuth and OAuth providers: A Comprehensive GuideThere are multiple ways in which we can authenticate a user over the web, few of them are: matching user credentials in the database, delegating responsibility to an external OAuth provider etc. We can extend those similar concepts in SvelteKit too a...Nathan and 1 other are discussing this2 people are discussing thisDiscuss路2 likes路2.3K readsSvelteKit Authentication using SvelteKitAuth and OAuth ProvidersSveltekit