YiliaforApache APISIXapisix.hashnode.dev·Mar 27, 2024Navigating Identity Authentication: From LDAP to Modern ProtocolsWhen constructing the identity authentication mechanism for network applications, engineers face various choices. One approach is to design a custom authentication mechanism, which may be suitable for certain newly developed applications. Another app...Discuss·10 likesauthentication
CerbosforCerbos's team blogcerbosdev.hashnode.dev·Mar 27, 2024What is an authorization API?Published by Furqan Butt on Cerbos Website March 26, 2024 Authorization is not to be confused with authentication, which involves verifying the identity of the user making a request. Authentication is the first step of application security. A user's...Discussauthentication
Himanshu Chauhanhimanshuchauhan.hashnode.dev·Mar 13, 2024Refresh token and JWT tokenIn this blog, we'll delve into two crucial security tokens utilized during server resource requests: the Refresh token and the JWT token. Our aim is to gain a comprehensive understanding of these tokens, discern their disparities, and underscore the ...DiscussJWT
Nipuna Upekshanipunaupeksha.hashnode.dev·Mar 8, 2024OAuth2 and OpenID Connect with WSO2 IS - Part 4🧬 Introduction As we discussed earlier, there are a few grant types that allow us to get Access Tokens so that our client application can access the resources in the resource server on our behalf. They are, Authorization Code Grant Type Implicit G...DiscussOAuth2 and OpenID Connect with WSO2 ISGrant Types
Emmanuel GautierforCerberAuthwww.cerberauth.com·Mar 7, 2024What is the difference between Authentication, Application authorization and Access Control ?Understanding the nuances between authentication, authorization, and fine-grained authorization is crucial. These concepts form the backbone of identity and access management (IAM) systems, laying the groundwork for securing digital assets and ensuri...Discussauthentication
rafna bashrafna.hashnode.dev·Mar 6, 2024Authorization - a priori access controlThe authorization happens when a user requests an action to an application before actually executing the action. You check by the access control rules that hold whether this user should be permitted to do this action. As we have dipped our feet in au...DiscussWeb Development
Aaron Jevil Nazarethaarons-space.hashnode.dev·Mar 6, 2024JSON Web Token(JWT)Introduction Json web tokens is the method using which information can be shared between 2 parties in a secure way. It allows you to decode, verify and generate JWT. What is Authentication? Authentication is the method of proving if something is genu...Discuss·11 likesJSON Web Tokens (JWT)
Syket BhattachergeeforCreoWis Blogcreowis.com·Mar 4, 2024How to set up Keycloak with NestJS?Looking to enhance your NestJS application's security and user management capabilities? Integrating Keycloak with NestJS can provide a robust solution. Follow this comprehensive guide to effortlessly set up Keycloak authentication within your NestJS ...Discusskeycloak
Aditya Ladadityaladblog.hashnode.dev·Feb 27, 2024SQL injection attackIntroduction:- It involves inserting SQL Queries through user input to manipulate the database. Successful exploitation can result in: Reading sensitive data from the database. Modifying database entries through insert, update, or delete operati...Discuss·10 likes·27 reads#sqlinjection
KrishnaBhagatekasnh86.hashnode.dev·Feb 17, 2024Exploring Tokens: Access Tokens vs. Refresh TokensImagine you are at a fancy party with a treasure vault full of goodies. You need a special key (access token) to unlock each treasure chest (resource) for a limited time. But what if that key expires? Don't worry, you have a master key (refresh token...Discusstoken