Roshan Shrestharosan-shrestha.com.np·Nov 13, 2024Authentication vs. AuthorizationIntroduction: Authentication and Authorization are two critical terms that form the backbone of security on the internet. Together, they help protect our personal information, prevent unauthorized access, and ensure that only trusted users can access...Discuss·3 likes·50 readsOAuthoauth
Wesley Cabuswesleycabus.be·Nov 5, 2024Are you sure your access tokens are really secure?Chances are high that if you’re building a Web API, you’re relying on access tokens when client applications or services interact with your API in order to perform authentication and authorization. The two most common types of access tokens are opaqu...Discuss·1 like·40 readsSecurity
Sahil Sharmasahil950.hashnode.dev·Nov 5, 2024Understanding access tokens, refresh tokens in web authenticationAuthentication of users and safe access to resources are the prime needs of modern web and mobile applications. Users must remain authenticated safely and hassle-free without having to log into each site or app every time they log in. Access tokens ...Discussauthentication
HOT HEADhothead01th.hashnode.dev·Nov 2, 2024Understanding the Malicious Use of OAuth ApplicationsThe Comprehensive Guide to Malicious Use of OAuth Applications: Understanding Parameters, Charts, and Case Studies OAuth (Open Authorization) is essential in today's interconnected digital landscape, facilitating secure access to user data across var...Discussmalicious
Pratiksha kadamlastoyster.hashnode.dev·Oct 20, 2024Boost Your Flutter App's Performance Using Supabase DatabaseIntroduction Supabase For Flutter App: Supabase offers a powerful backend solution that works seamlessly with Flutter, allowing developers to build complex applications quickly. By using Supabase's features like real-time data handling and authentica...DiscussFlutter
Basir Khanbasirblog.hashnode.dev·Oct 18, 2024Dockerfile Generation Made Easy: Build, Download, and Commit with DockerGenCreating a Dockerfile from scratch can be time-consuming and complicated, especially if you're aiming to follow Docker best practices. But don’t worry—we’ve built a Dockerfile Generation Website that simplifies the entire process. With our tool, you ...Discuss·97 reads🖥️ DevopsFree Dockerfile Generator
Rahul wathblog.aws-devops.blog·Oct 13, 2024How to use Github as a SSO of ArgoCDImagine having ArgoCD installed as your GitOps source for your cluster, having your dashboard exposed on the web, and wanting to give access to your developers. You think about the best way to do it. You have to create users and groups, attach the us...DiscussArgoCD
VoorivexforVoorivex's Teamblog.voorivex.team·Oct 11, 2024Drilling the redirect_uri in OAuthI’ve been hunting for several years as a part-time hunter and have discovered many vulnerabilities. My most focused area, and my favorite, is the authentication class, which includes sign-up, sign-in, forgot password, 2FA, account deletion, etc. Nowa...Moustafa Shikho and 3 others are discussing this4 people are discussing thisDiscuss·16 likes·1.9K readsoauth
Rahul wathblog.aws-devops.blog·Oct 10, 2024Enabling SSO Authentication for Argo CD with GitLab or GitHubSingle Sign-On (SSO) is a user authentication process that allows users to access multiple applications and services with a single login credential. Instead of having separate usernames and passwords for each system, SSO enables users to log in once ...DiscussAWS
Sajan Adhikarisajanadhikari.hashnode.dev·Sep 13, 2024Implementing Google OAuth in Django: A Comprehensive GuideAuthentication is a crucial aspect of web applications, and offering users the ability to sign in with their Google accounts can greatly enhance user experience. This guide will walk you through the process of implementing Google OAuth in a Django ap...Discuss·1 like·26 readsDjango