Pranav ShikarpurforPangea Blogpangea.cloud·15 hours agoWhy I Love HackathonsTo Me, hackathons embody the excitement of the possible. Until the last submission comes in you never know what amazing works of art will come through and how it can open your eyes to solving problems in creative and unique ways. Even after my experi...Discusshackathon
Raul NaupariProblog.raulnq.com·15 hours agoSecuring .NET APIs with Amazon CognitoIn this article, we delve into securing .NET APIs with Amazon Cognito, specifically focusing on ensuring authenticated users have the necessary permissions to access resources. Building on the foundation laid in the previous article, Amazon Cognito A...Discuss.NET
YiliaforApache APISIXapisix.hashnode.dev·Mar 27, 2024Navigating Identity Authentication: From LDAP to Modern ProtocolsWhen constructing the identity authentication mechanism for network applications, engineers face various choices. One approach is to design a custom authentication mechanism, which may be suitable for certain newly developed applications. Another app...Discuss·22 likesauthentication
CerbosforCerbos's team blogcerbosdev.hashnode.dev·Mar 27, 2024What is an authorization API?Published by Furqan Butt on Cerbos Website March 26, 2024 Authorization is not to be confused with authentication, which involves verifying the identity of the user making a request. Authentication is the first step of application security. A user's...Discussauthentication
Sk Samidul Hossainsamidul.hashnode.dev·Mar 25, 2024"Understanding Access and Refresh Tokens: Simplifying User Authentication"Table of contents Introduction to Access and Refresh Tokens Why Access and Refresh Tokens are Necessary How Access and Refresh Tokens Function Conclusion ♦️ Introduction to Access and Refresh Tokens:- \=>>Access and refresh tokens are unique st...Discussexpess js
SWATHI PUNREDDYswathireddy.hashnode.dev·Mar 24, 2024Unveiling the Power of Terraform Providers: A Deep DiveGreetings fellow Terraform enthusiasts! Welcome to Day 6 of our TerraWeek challenge. Today, we embark on an exhilarating journey into the heart of Terraform providers, unraveling their intricacies and mastering their capabilities across various cloud...Discuss·28 reads#ProviderComparison
Riyaz Nabiyullariyaz-blog.hashnode.dev·Mar 21, 2024Understanding JSON Web Tokens (JWT)Introduction: In today's interconnected world, security is paramount, especially when it comes to authenticating and authorizing users in web applications. JSON Web Tokens (JWT) have emerged as a popular method for securely transmitting information b...DiscussJWT
Lokesh Sharmalokeshkavisth.hashnode.dev·Mar 21, 2024Secure Your ExpressJS & ReactJS App: User Authentication with JWTUser authentication is an essential component of every modern Web application. It enables you to restrict access to specific features and data based on a user's login state. This tutorial will walk you through creating user authentication with JSON W...DiscussThe Dev Diaries: 100 Days, 100 BlogsJWT
Sudip Bhandariicpcs.hashnode.dev·Mar 20, 2024ASP.NET Core MVC Login and Registration using IdentityWhat is identity in ASP.NET? ASP.NET Identity provides a robust and customizable framework for managing user authentication, authorization, and identity-related features in web applications. Some key features of ASP.NET Identity include: User Authen...Discuss·265 readslogin and register using asp.net
Robin Thakurrobinthakur00.hashnode.dev·Mar 20, 2024Creating a user in the Kubernetes clusterStep 1: Generate a private key To generate a private key with OpenSSL, run the following command: openssl genrsa -out robin.key 2048 This command generates a new 2048-bit RSA private key and saves it to a file called user.key. Step 2: Create a cert...Discuss·1 like·28 readsKubernetesUser