Wayne Foster Jrblog.cloud-way.dev·2 hours agoMastering Subdomains in Next.js with MiddlewareIntroduction Multi-tenant applications, different sections within your site, or even personalized user experiences – sometimes you need to dynamically route requests based on subdomains in your Next.js project. With Next.js middleware, this is now ea...DiscussNext.js
Code Skycodesky.cloudhero.in·2 hours agoExploring Privacy and Security: Comparing SSL Certificates to P.O. BoxesIn today's digital age, privacy and security are paramount concerns for individuals and businesses alike. Whether it's protecting sensitive information online or safeguarding physical mail, finding reliable methods to ensure privacy and security is e...DiscussPOBox
SATYAM KUMAR PANDEYprogrammersatyam.hashnode.dev·5 hours ago"Demystifying Cookies: Understanding their Role in Web Development"Introduction of Cookies : Cookies are small pieces of data stored in the client's browser. In MERN stack web development, cookies are commonly used for various purposes, such as session management, user authentication, and tracking user preferences. ...DiscusscookieParser
Pranav ShikarpurforPangea Blogpangea.cloud·a day agoWhy I Love HackathonsTo Me, hackathons embody the excitement of the possible. Until the last submission comes in you never know what amazing works of art will come through and how it can open your eyes to solving problems in creative and unique ways. Even after my experi...Discusshackathon
Raul NaupariProblog.raulnq.com·a day agoSecuring .NET APIs with Amazon CognitoIn this article, we delve into securing .NET APIs with Amazon Cognito, specifically focusing on ensuring authenticated users have the necessary permissions to access resources. Building on the foundation laid in the previous article, Amazon Cognito A...Discuss.NET
YiliaforApache APISIXapisix.hashnode.dev·Mar 27, 2024Navigating Identity Authentication: From LDAP to Modern ProtocolsWhen constructing the identity authentication mechanism for network applications, engineers face various choices. One approach is to design a custom authentication mechanism, which may be suitable for certain newly developed applications. Another app...Discuss·26 likesauthentication
CerbosforCerbos's team blogcerbosdev.hashnode.dev·Mar 27, 2024What is an authorization API?Published by Furqan Butt on Cerbos Website March 26, 2024 Authorization is not to be confused with authentication, which involves verifying the identity of the user making a request. Authentication is the first step of application security. A user's...Discussauthentication
Sk Samidul Hossainsamidul.hashnode.dev·Mar 25, 2024"Understanding Access and Refresh Tokens: Simplifying User Authentication"Table of contents Introduction to Access and Refresh Tokens Why Access and Refresh Tokens are Necessary How Access and Refresh Tokens Function Conclusion ♦️ Introduction to Access and Refresh Tokens:- \=>>Access and refresh tokens are unique st...Discussexpess js
SWATHI PUNREDDYswathireddy.hashnode.dev·Mar 24, 2024Unveiling the Power of Terraform Providers: A Deep DiveGreetings fellow Terraform enthusiasts! Welcome to Day 6 of our TerraWeek challenge. Today, we embark on an exhilarating journey into the heart of Terraform providers, unraveling their intricacies and mastering their capabilities across various cloud...Discuss·1 like·29 reads#ProviderComparison
Riyaz Nabiyullariyaz-blog.hashnode.dev·Mar 21, 2024Understanding JSON Web Tokens (JWT)Introduction: In today's interconnected world, security is paramount, especially when it comes to authenticating and authorizing users in web applications. JSON Web Tokens (JWT) have emerged as a popular method for securely transmitting information b...DiscussJWT