Okoye Ndidiamakaamikdigital.hashnode.dev·Sep 15, 2024Authentication and Authorization: Best Practices for Securing Web ApplicationsIn the digital age, securing web applications has become more critical than ever. With cyber threats constantly evolving, understanding the core principles of authentication and authorization is crucial for every developer and organization. These two...DiscussSecurewebapp
omu inetimimizzle.hashnode.dev·Sep 14, 2024Make Your FastAPI App Secure with UserfrontPython devs this is for you! In this article, I’ll show you how to simplify authentication in your fast API app using a neat little tool called Userfront. It helps you set up things like sign-ups, logins, and password resets without having to build e...DiscussPython
Vanessa VillaforPangea Blogpangea.cloud·Sep 10, 2024How to ABAC: Banking EditionWhat is ABAC? Attribute-based Access Control is an authorization schema that allows for fine-grained access policies to be created based on attributes like location, time of day, and a user’s department. For a more detailed look as to the benefits of...Discussauthorization
Keith CaseyforPangea Blogpangea.cloud·Sep 10, 2024AuthZ: ABAC == trueAll of access control comes down to one fundamental question: How do we grant the right access to the right things to the right people and systems for the right amount of time? Every other question addresses an aspect or nuance within that question. ...Discussauthorization
Dharm Joshidharmjoshi.hashnode.dev·Sep 6, 2024FeaturedBuild End-to-End Authentication and Authorization system in NodeJSIntroduction In day-to-day terms using every application or website that requires some of your information to store and then allows you to have your account access using a combination of password and another identifier like your Email-Id or your user...Andrew Baisden and 2 others are discussing this3 people are discussing thisDiscuss·40 likes·568 readsNode.js
Vanessa VillaforPangea Blogpangea.cloud·Sep 4, 2024RBAC vs ReBAC vs ABAC: Comparison and Guide on how to get startedWhat is authorization (AuthZ)? Authorization is a cornerstone of enterprise security. It dictates who can access specific resources, what actions they can perform, when, and the authorization logic can be as rigorous as to include attributes such as ...Discussauthorization
Samuel Nwankwosaminwankwo.hashnode.dev·Sep 1, 2024Understanding Authentication vs. Authorization: What’s the Difference?You might have heard the terms authentication and authorization when dealing with online accounts or security settings. Although they sound similar, they mean different things. Let’s break them down in simple language so you can easily understand the...DiscussAPIs
Oluwasanmi Akandedevyarnswithsanmi.hashnode.dev·Aug 27, 2024Comparing JWT Methods: Decode vs. Verify ExplainedINTRODUCTION Authentication and authorization systems are an important component of modern software architecture, they are the most obvious entry point into your software system, basically the front gate to your application. As a backend engineer, bu...DiscussJSON Web Tokens (JWT)
Evaldas Visockashashnode.programmersdiary.com·Aug 16, 2024Implementing JWT token authorization in FEHi. This is the fifteenth part of the diary about developing the “Programmers’ diary” blog. The open source code of this project is on https://github.com/TheProgrammersDiary. The fourteenth part: https://hashnode.programmersdiary.com/user-sign-in-wit...DiscussJWT
Yash Shrivastavashy053.hashnode.dev·Aug 13, 2024Understanding OAuth2.0 and OpenID Connect: A Simple Guide with ImplementationIdentity and resource ? Identity and access management (IAM) deals with making sure who can access what. Only the people with proper access with a limited set of permissions can access or alter a user’s data. There are two aspects to this from an app...Discuss·31 readsauthentication