Josué Tchirktemajosue.hashnode.dev·7 hours agoSessions vs JWT : Le Match du Siècle dans l’Arène des Authentifications !Bienvenue dans l'arène de la Battle Royale où deux titans s'affrontent pour déterminer qui mérite votre confiance pour protéger vos utilisateurs : "SessionMan" et "JWTor" ! Préparez vos pop-corns, c'est parti pour un duel digne d’un film indien. 🍿 ...DiscussSession
Shalon N. Ngiginjeri-ngigi.hashnode.dev·Nov 28, 2024Auth 101: Token Based Authentication💡 This is a stack agnostic strategy that can be implemented in a number of frameworks and languages. I, however, might reference ReactJS (client) and NodeJS (server). Overview There are a number of ways to implement secure authentication and autho...Discuss·1 like·52 readsJWT token,JSON Web,Token,Token authentication,Access token,JSON token,JWT security,JWT authentication,Token-based authentication,JWT decoding,JWT implementation
Anton Ernstv4tech.hashnode.dev·Nov 27, 2024Authentication: Architecture and Security – MicroTube Part IRecently I finished the MVP of one of my big projects - MicroTube (aka mini Youtube). The project turned out to be quite complex, with many parts such as authentication, video processing, search, reactions, comments, etc. So I thought it would be int...Discuss·213 readsauthentication
syncfusionsyncfusion-blogs.hashnode.dev·Nov 26, 2024How to Implement Passkey in ASP.NET Core with Fido2-net-lib?TL;DR: Discover how to implement Passkey authentication in your ASP.NET Core app using the Fido2-net-lib library. Enhance security with a passwordless, phishing-resistant method that leverages public-key cryptography. In today’s digital landscape, en...Discussasp.net core
gayatri kumargeekee.hashnode.dev·Nov 24, 2024Securing Your API: Implementing Authentication and Best PracticesIn the previous part, we enhanced our API with error handling and data validation to make it more robust and user-friendly. Now, it’s time to secure our API by adding authentication and safeguards against potential vulnerabilities. APIs often handle ...Discuss·10 likesWeb Developmentjs
Adityaa krdevsadi.hashnode.dev·Nov 23, 2024Revolutionize dApp Onboarding: Seamlessly Build on Morph with Privy SDKIntroduction Unlock the full potential of Morph by seamlessly integrating the Privy SDK. Picture this: you can make user onboarding in your dApp a breeze with options like social logins, email sign-ups, and Google Sign-In—those familiar, Web2-friendl...Discuss·2 likesprivy
Shubham Tawareshubzz.hashnode.dev·Nov 23, 2024How to Grant AWS Users Access to an EKS Cluster: A Step-by-Step GuidManaging user access to resources in Amazon EKS is crucial for security and control. In this blog, we'll show you how to give a new user, Shubham, read-only access to an EKS cluster. This is especially useful when you want someone to monitor Kubernet...Discuss·44 readsIAM
ObumforfreeCodeCampfreecodecamp.org·Nov 22, 2024How to Implement RBAC in a Community Dashboard with NuxtRole Based Access Control (RBAC) is a useful authorization model for users with different access levels, such as those in a community dashboard. In this article, you’ll learn how to integrate this type of authorization with Permit.io in Nuxt. Table o...Discussauthorization
Yug Jadvanitheyugjadvani.hashnode.dev·Nov 16, 2024Mastering Authentication in Next.js - A Step-by-Step Guide to GitHub Login with Auth.jsIntroduction Next.js has become a preferred framework for modern web applications due to its simplicity and flexibility. One key aspect of any application is user authentication, and integrating GitHub login into a Next.js project is a practical choi...DiscussNext.js
Mr. Ånandastrodevil.hashnode.dev·Nov 15, 2024FeaturedManage Permissions in a Langflow Chain for LLM Queries using Permit.ioAI technology is advancing faster than ever, and managing access control and permissions within large language model (LLM) workflows is crucial, mainly when you’re dealing with sensitive data or optimizing resource usage. Without a well-structured ac...Discuss·23 likes·67 readsllm