Brian Bakerbrianbaker.hashnode.dev·Mar 21, 2024Angular's Ivy Renderer: Performance Boosts and New FeaturesAngular's Ivy renderer, introduced in version 9, has been a game-changer for the popular JavaScript framework. This cutting-edge rendering engine has not only significantly improved performance but has also brought a host of new features to the table...DiscussAspNetCoreSecurity, AuthorizationPolicies
Rizel ScarlettforTBDtbdevs.hashnode.dev·Mar 6, 2024FeaturedA Beginner-Friendly Illustrated Guide to Verifiable CredentialsThis blog post uses storytelling to introduce beginners to Verifiable Credentials, followed by a tutorial on creating them in JavaScript and Kotlin. In Our Last Issue... In our previous issue, we met Dawson Webhart, a junior frontend software enginee...Discuss·12 likes·72 readsweb5
Rizel Scarlettblackgirlbytes.dev·Mar 6, 2024A Beginner-Friendly Illustrated Guide to Verifiable CredentialsThis blog post uses storytelling to introduce beginners to Verifiable Credentials, followed by a tutorial on creating them in JavaScript and Kotlin. In Our Last Issue... In our previous issue, we met Dawson Webhart, a junior frontend software enginee...Discuss·1 like·45 readscryptographic identity verification
M. Hanif Azharyfor2SpacesDev's team blogblog.2spaces.dev·Dec 25, 2023#1 Bootstrapping the Organization Identity ManagementImagine, you joined an organization and everyone is sharing password for one single Firebase or Azure account, yuck😬. So, what we do first is bootstrapping. We chose Microsoft environment as our first entry. We signed up for a personal Microsoft acc...DiscussThe BootstrappingIdentity
Julia Ofoegbujuliaofoegbu.hashnode.dev·Nov 28, 2023Exploring Web5: Solution to Identity Control and Data MisplacementIntroduction This article aims to identify the existing problems facing identity management systems globally, loopholes in Web3’s attempt to solve these problems, and the emergence of Web5 - the light at the end of a very long tunnel. Web2 Giants and...Discuss·4 likes·43 readsdata theft
Miguel Treviñodevblog.verifik.co·Sep 13, 2023Identity Validation in Colombia via API. Fraud prevention made easy!In an era where identity verification is paramount, Verifik emerges as a beacon of trust for businesses and individuals alike in Colombia. With its state-of-the-art technology, Verifik offers a seamless way to validate identities directly from govern...DiscussColombia
SuperTokenssupertokens.hashnode.dev·Aug 31, 2023Understanding JWKS (JSON Web Key Set)Introduction JWTs or Json Web Tokens play a pivotal role in modern authentication. They are most commonly used to identify authenticated users and validate API requests. Part of this verification process requires the use of cryptographic keys to vali...Discuss·70 readsIdentity
SuperTokenssupertokens.hashnode.dev·Aug 7, 2023Authentication vs Authorization: What's the difference?Introduction Although they are often conflated with each other, Authentication and Authorization represent two fundamentally different aspects of security that work together in order to protect sensitive information. In this blog, we will go over som...DiscussIdentity
Darren Robinsondarrenjrobinson.hashnode.dev·Jun 30, 2023PowerShell Automation for 1PasswordOver two years ago I authored a PowerShell Module that enabled the automation of 1Password. I created the module because I wanted to be able to: Securely store locally a configuration for accessing a 1Password online Vault Automate authentication a...Discuss·3 likes·68 reads1password
Eyal KatzforSlauth.io - The IAM Copilot's blogblog.slauth.io·Jun 28, 2023A Step-by-Step Guide to Cloud Identity ManagementCloud Identity Management empowers organizations to strengthen security, streamline operations, and maintain compliance in the ever-evolving cloud landscape. As your company scales, so do your workloads and services connected to your cloud infrastruc...Discuss·314 readsIAM management best practicesCloud