Sandeep Ranasandeep10rana.hashnode.dev·Dec 4, 2024Setting Up Google & GitHub OAuth2 Login in a Spring Boot ApplicationWhat comes to your mind when we say OAuth2? In simple words, if we don’t want to use username and password, nowadays we are heavily relying on Google for our day to day works like Gmail, YouTube, etc. Why not use same credential in other interfaces? ...10 likes·53 readsSpringboot
0xrzforVoorivex's Teamblog.voorivex.team·Nov 22, 2024OAuth Non-Happy Path to ATOA few months ago, I was working on a public bug bounty program, and there was an OAuth implementation for users to log in and sign up. Introduction First of all, before you start reading this blog post, you should be familiar with some concepts: Happ...19 likes·2.9K readsbugbounty
Roshan Shrestharosan-shrestha.com.np·Nov 13, 2024Authentication vs. AuthorizationIntroduction: Authentication and Authorization are two critical terms that form the backbone of security on the internet. Together, they help protect our personal information, prevent unauthorized access, and ensure that only trusted users can access...3 likes·59 readsOAuthoauth
Wesley Cabuswesleycabus.be·Nov 5, 2024Are you sure your access tokens are really secure?Chances are high that if you’re building a Web API, you’re relying on access tokens when client applications or services interact with your API in order to perform authentication and authorization. The two most common types of access tokens are opaqu...1 like·45 readsSecurity
Sahil Sharmasahil950.hashnode.dev·Nov 5, 2024Understanding access tokens, refresh tokens in web authenticationAuthentication of users and safe access to resources are the prime needs of modern web and mobile applications. Users must remain authenticated safely and hassle-free without having to log into each site or app every time they log in. Access tokens ...authentication
HOT HEADhothead01th.hashnode.dev·Nov 2, 2024Understanding the Malicious Use of OAuth ApplicationsThe Comprehensive Guide to Malicious Use of OAuth Applications: Understanding Parameters, Charts, and Case Studies OAuth (Open Authorization) is essential in today's interconnected digital landscape, facilitating secure access to user data across var...malicious
Pratiksha kadamlastoyster.hashnode.dev·Oct 20, 2024Boost Your Flutter App's Performance Using Supabase DatabaseIntroduction Supabase For Flutter App: Supabase offers a powerful backend solution that works seamlessly with Flutter, allowing developers to build complex applications quickly. By using Supabase's features like real-time data handling and authentica...Flutter
Basir Khanbasirblog.hashnode.dev·Oct 18, 2024Dockerfile Generation Made Easy: Build, Download, and Commit with DockerGenCreating a Dockerfile from scratch can be time-consuming and complicated, especially if you're aiming to follow Docker best practices. But don’t worry—we’ve built a Dockerfile Generation Website that simplifies the entire process. With our tool, you ...107 reads🖥️ DevopsFree Dockerfile Generator
Rahul wathblog.aws-devops.blog·Oct 13, 2024How to use Github as a SSO of ArgoCDImagine having ArgoCD installed as your GitOps source for your cluster, having your dashboard exposed on the web, and wanting to give access to your developers. You think about the best way to do it. You have to create users and groups, attach the us...ArgoCD
VoorivexforVoorivex's Teamblog.voorivex.team·Oct 11, 2024Drilling the redirect_uri in OAuthI’ve been hunting for several years as a part-time hunter and have discovered many vulnerabilities. My most focused area, and my favorite, is the authentication class, which includes sign-up, sign-in, forgot password, 2FA, account deletion, etc. Nowa...16 likes·2.9K readsoauth