Roshan Shrestharosan-shrestha.com.np·Nov 13, 2024Authentication vs. AuthorizationIntroduction: Authentication and Authorization are two critical terms that form the backbone of security on the internet. Together, they help protect our personal information, prevent unauthorized access, and ensure that only trusted users can access...Discuss·3 likes·50 readsOAuthoauth
Nitish singhsinghnitish.hashnode.dev·Nov 10, 2024Web Application AuthenticationHey! I’m back with another exciting article on Authentication. It is basically checking or making sure that the information is passed on to the correct user. In web applications like simple landing pages, we do not need to use authentication because ...Discussauthentication
caner demircicanerdemirciblog.hashnode.dev·Nov 7, 2024Next.js 14 Admin Panel Security: Using JWT and PIN Code Authentication with App RouterI am working on my blog project and have created an admin panel with the route /admin. To secure the admin routes, I created an authentication system using a PIN input method that employs JWT and refresh token logic. The refresh token is important be...DiscussNext.js
Sahil Sharmasahil950.hashnode.dev·Nov 5, 2024Understanding access tokens, refresh tokens in web authenticationAuthentication of users and safe access to resources are the prime needs of modern web and mobile applications. Users must remain authenticated safely and hassle-free without having to log into each site or app every time they log in. Access tokens ...Discussauthentication
KUNTAL MAITYkuntalmaity.hashnode.dev·Nov 5, 2024difference between access token and refresh tokenWhy tokens? Authentication and Authorization are the crucial steps for protecting user data. Hear token based authentication comes into the picture. There are many authentication methodologies are available but took in based authentication is most po...Discussaccess-token
Keith CaseyforPangea Blogpangea.cloud·Oct 30, 2024Building Authorization in AI AppsWhen we look at the current state of generative AI, we think of products like ChatGPT, Google Gemini, Claude, and similar. Those are all publicly available tools trained on public data and useful for general topics for a general audience. But if we e...Discuss·57 readsauthorization
Ankur TyagiforfreeCodeCampfreecodecamp.org·Oct 24, 2024How to Implement Fine-Grained Authorization in Java and SpringBootSecuring your application goes beyond simply granting or denying access at the surface level. As a developer, you need to implement fine-grained authorization (FGA) to manage permissions at a more detailed, granular level. FGA allows you to set up de...DiscussJava
AMITfuture-stack.hashnode.dev·Oct 23, 2024How Access and Refresh Tokens Work in User Authentication?In today’s digital landscape, authentication is the backbone of secure web and mobile applications. Whether you’re signing into a social media platform or accessing a cloud service, the system needs to verify your identity and determine what resource...Discussrefresh-token
Mahmoud Sameer Shalayelsillar.hashnode.dev·Oct 17, 2024Authentication vs Authorization: Key Differences ExplainedThere is no system without users, right? But how do we verify whether the person trying to access the system is a user or not? And if they are a user, what permissions do they have? Authentication and authorization are very important for creating a s...DiscussWeb Development
Kuldeep YadavforBreachForcebreachforce.net·Oct 17, 2024Secure Your Node.js Applications: Top 10 Critical Vulnerabilities to Identify and Prevent Major ThreatsHave you ever had one of those moments when you feel confident about the code you’ve written — until a VAPT (Vulnerability Assessment and Penetration Testing) team reviews it? Suddenly you’re faced with a sea of red flags and dire warnings. Words lik...Discuss·110 readsNode.js