© 2023 Hashnode
#oauth
Beware, technical article ahead! OAuth 2 and OpenID are complex protocols. It's full of tiny details that are there for the sake of security and it's not always clear why some checks are necessary. T…
In some scenarios, the traditional API key header, or humble JWT bearer token, is not enough to secure our most sensitive information. Therefore we must turn to other methods to ensure privileged acce…
Email authentication has become increasingly important in recent years for the overall security of online communication, by ensuring authenticity, and protection against email fraud, phishing and othe…
Security is a top priority for any website in the modern online environment. It is crucial to make sure that your website is safe and shielded from any potential risks given the rise in cyberattacks. Implementing Single Sign-On (SSO) for yo…
Introduction Ahoy, fellow explorers! Are you ready to embark on an epic journey through the fascinating world of OAuth 2.0? With this Hashnode blog post as your trusty compass, we'll navigate the vast ocean of this powerful authorization fr…
Theo Gravity is a FusionAuth community member and senior engineer at Switchboard. He chatted with us over email about how he and his team are using FusionAuth to meet their auth needs. This interview …
Access tokens and JSON Web Tokens (JWTs) are widely used in modern web applications as a means of authentication and authorization. An access token is a kind of credential that represents the authoriz…
At the end of the OAuth Authorization Code grant, after a user presents their credentials at login, a code is returned which can be exchanged for one or more tokens at the token endpoint. These tokens…
Last week, the new Twitter API access tiers were finally announced. Unfortunately, some important details were left out from the announcement, leaving many developers confused and stressed out as the …
TL;DR: Le Code: https://github.com/dirien/quick-bites/tree/main/pulumi-cognito-gitops-ui/argocd Introduction In this blog post, I want to show you how to create and use AWS Cognito as an OAuth2 prov…