Yug Jadvanitheyugjadvani.hashnode.dev·Nov 16, 2024Mastering Authentication in Next.js - A Step-by-Step Guide to GitHub Login with Auth.jsIntroduction Next.js has become a preferred framework for modern web applications due to its simplicity and flexibility. One key aspect of any application is user authentication, and integrating GitHub login into a Next.js project is a practical choi...DiscussNext.js
Mr. Ånandastrodevil.hashnode.dev·Nov 15, 2024FeaturedManage Permissions in a Langflow Chain for LLM Queries using Permit.ioAI technology is advancing faster than ever, and managing access control and permissions within large language model (LLM) workflows is crucial, mainly when you’re dealing with sensitive data or optimizing resource usage. Without a well-structured ac...Discuss·22 likes·57 readsllm
Harsh Soniharshdevopss.hashnode.dev·Nov 14, 2024Implementing Passwordless Authentication with AnsibleIn this blog, I explore three common methods of setting up passwordless authentication: using SSH keys, SSH-copy-id, and password-less configurations. Passwordless authentication is a secure, efficient way to access remote systems without entering pa...Discuss·1 likeDevops
Roshan Shrestharosan-shrestha.com.np·Nov 13, 2024Authentication vs. AuthorizationIntroduction: Authentication and Authorization are two critical terms that form the backbone of security on the internet. Together, they help protect our personal information, prevent unauthorized access, and ensure that only trusted users can access...Discuss·3 likes·50 readsOAuthoauth
Derrick Munyolederrick-munyole.hashnode.dev·Nov 11, 2024Introduction to Authentication and AuthorizationYou’ve probably encountered the terms Authentication and Authorization while reading about the fascinating stories that keep popping up about Cyber Security, and your brain hurts. What the heck do they mean? And yes, they are two eerily similar words...Discussauthentication
Nitish singhsinghnitish.hashnode.dev·Nov 10, 2024Web Application AuthenticationHey! I’m back with another exciting article on Authentication. It is basically checking or making sure that the information is passed on to the correct user. In web applications like simple landing pages, we do not need to use authentication because ...Discussauthentication
Hussnain Ahmadpsychocoder.hashnode.dev·Nov 9, 2024Revizio: A Flashcard Tool to Boost Retention Through Spaced RepetitionHi, I am writing after one month now. Previously, I ended my series “Weekly Dev Journal” that I was writing from start of 2023. after that, I didn’t get motivation to write about something. Then, I got idea for articles, and I thought I made projects...Discuss·10 likesBuilding from Scratchbuilding from scratch
Pavan Kumar Kpavan-blog.hashnode.dev·Nov 10, 2024Google Authentication in a MERN Stack Application with Passport.jsIntegrating third-party authentication systems like Google can save time and effort and provide security for the process. This blog will walk you through the steps of implementing Google OAuth authentication in a MERN stack app (MongoDB, Express, Rea...Discussgoogle Oauth
Romman Sabbirrommansabbir.com·Nov 8, 2024Application Security in Android: A Comprehensive Guide [PART 3]Application security is essential for preventing unauthorized access, reverse engineering, and tampering with your Android apps. There are several strategies and tools that developers can employ to protect their applications from these threats. In th...Discuss·48 readsAndroid : Security, Encryption and Secure Practicesrooted
caner demircicanerdemirciblog.hashnode.dev·Nov 7, 2024Next.js 14 Admin Panel Security: Using JWT and PIN Code Authentication with App RouterI am working on my blog project and have created an admin panel with the route /admin. To secure the admin routes, I created an authentication system using a PIN input method that employs JWT and refresh token logic. The refresh token is important be...DiscussNext.js