Avinash Dalviwww.internetkatta.com·21 hours agoHow to Implement Authorization in React JSHello devs, In this blog, we will learn how to implement an authorization mechanism in ReactJS applications using Cerbos. Before, let's understand the basics of authorization and why it is needed. Any application that requires a user login needs an ...Discuss·1 likeCerbos
Raul NaupariProblog.raulnq.com·May 1, 2024How to Secure AWS Lambda Functions Using Amazon API Gateway and AWS IAMAWS Amazon API Gateway supports multiple methods to secure our REST APIs. One of them, AWS IAM Authorization, is a good fit in scenarios where both the caller and the callee are within AWS, and we want to avoid sharing keys and secrets between them. ...DiscussAWS Lambdaamazon api gateway
Atif Aliatifff.hashnode.dev·Apr 30, 2024Authentication in MERN stack using JWTIntroduction Authentication: At its core, this is about identity. When users provide credentials (a username and password, a fingerprint, or a facial scan), the system checks these details against a stored record. If they match, the user is authentic...DiscussJWT token,JSON Web,Token,Token authentication,Access token,JSON token,JWT security,JWT authentication,Token-based authentication,JWT decoding,JWT implementation
2Hats Logic Solutions2hatslogicsolutions.hashnode.dev·Apr 29, 2024How to handle authentication and authorization securely in Laravel?Understanding Authentication and Authorization 1. The Fundamentals of Authentication and Authorization Security is essential for all applications and software's. Authentication and Authorization are the two essential components of web security that g...Discussauthentication
Aditya Singh Parmarcoderadi.hashnode.dev·Apr 28, 2024Difference Between Access Token and Refresh Token.Refresh Tokens: What are Refresh Tokens? Refresh tokens are long-lived credentials that are used to obtain new access tokens when the current access token expires. Access tokens typically have a short lifetime, often around 1 hour, for security reaso...Discussbackend
CerbosforCerbos's team blogcerbosdev.hashnode.dev·Apr 23, 2024How to Implement Authorization in React JSHello devs, In this blog, we will learn how to implement an authorization mechanism in ReactJS applications using Cerbos. Before, let's understand the basics of authorization and why it is needed. Any application that requires a user login needs an ...DiscussReact
CerbosforCerbos's team blogcerbosdev.hashnode.dev·Apr 19, 2024A Complete Guide to Next.js AuthorizationIn this tutorial, we’ll learn about authorization, how it works, and how to integrate it into a Next.js application using Cerbos, an open-source authorization project. This approach will allow us to seamlessly manage and enforce access controls withi...DiscussNext.js
Neerajdevstream.hashnode.dev·Apr 13, 2024Exploring Access and Refresh Tokens: A Deep Dive into Authentication and AuthorizationEver feel like you're constantly logging in to websites and apps? Those logins rely on a fascinating behind-the-scenes dance between access tokens and refresh tokens. In this blog post, we'll break down these digital keys and how they work together t...Discussauthentication
CerbosforCerbos's team blogcerbosdev.hashnode.dev·Apr 4, 2024Building secure applications: Key insights on authentication and authorization from Cerbos and Microsoft EntraPublished by Martin Gjoshevski & Alex Olivier on April 03, 2024 Understanding the critical roles of authentication and authorization is essential in safeguarding data and ensuring system security across various software applications. Our latest coll...Discussauthentication
Raul NaupariProblog.raulnq.com·Apr 3, 2024How to Implement Authorization in .NET APIs with Amazon CognitoAuthorization is the process that determines what users can do after they are authenticated. In the .NET ecosystem, it's straightforward to implement the most common approaches, such as role-based access control (RBAC) or attribute-based access contr...Discuss·46 readsAWS