Romman Sabbirrommansabbir.com·Nov 2, 2024Secure User Authentication in Android: A Comprehensive Guide [PART 2]User authentication is one of the most critical security aspects of any mobile application. Implementing secure authentication methods ensures that users’ data and accounts are protected from unauthorized access. In this article, we will dive deep in...Discuss·40 readsAndroid : Security, Encryption and Secure PracticesAndroid
Thomas DelafayeforCloud APIM's blogblog.cloud-apim.com·Oct 17, 2024🚀 Introducing Cloud APIM Authify - Instantly Integrate a Complete Authentication Solution with Zero HassleManaging authentication for your websites and apps can be time-consuming and complex. That’s where Cloud APIM Authify comes in 🤩 Authify is an all-in-one, easy-to-use authentication solution that enables you to securely manage user access to your ap...Discussauthify
Kirill Kovalevkirill-abblix.hashnode.dev·Aug 27, 2024Modern Authentication on .NET in Practice: OpenID Connect, BFF and SPAIntroduction As web technologies continue to advance, so do the methods and protocols designed to secure them. The OAuth 2.0 and OpenID Connect protocols have significantly evolved in response to emerging security threats and the growing complexity o...Discuss·1 like·103 readsauthentication
Nicholas Diamondnicholasdiamond.hashnode.dev·Aug 23, 2024Securing APIs with OAuth2 and OpenID Connect for Modern Web ApplicationsIn today’s interconnected world, securing RESTful APIs is critical. As APIs often handle sensitive data, ensuring that only authorized users and applications can access them is paramount. OAuth2 and OpenID Connect (OIDC) have emerged as robust framew...DiscussAPIs
Yash Shrivastavashy053.hashnode.dev·Aug 13, 2024Understanding OAuth2.0 and OpenID Connect: A Simple Guide with ImplementationIdentity and resource ? Identity and access management (IAM) deals with making sure who can access what. Only the people with proper access with a limited set of permissions can access or alter a user’s data. There are two aspects to this from an app...Discuss·31 readsauthentication
Yilia LinforAPI7api7.hashnode.dev·Jul 4, 2024OpenID vs OAuthTo ensure the security of user information and allow third-party applications to access restricted resources, two mainstream technologies have emerged: OpenID Connect and OAuth. While these two are often discussed together, they fundamentally differ ...Discuss·29 likesOpenID Connect
Ulaş Özdemirulasozdemir.com.tr·Jun 12, 2024Enterprise-Level Authentication in a Containerized Environment for Next.js 13TL;DR https://github.com/ozdemirrulass/keycloak-nextjs-mysql-docker 💡 This tutorial uses Next-Auth and Next-Auth is becoming AuthJS! If you want to use AuthJS for working with latest versions checkout THIS POST This article aims to provide a step...Discuss·831 readskeycloak
Alexey Poltorakalexeypoltorak.hashnode.dev·Jun 8, 2024OpenID Connect: From Implicit to Authorization Code with PKCE & BFFIntroduction This article will review the principles behind various OpenID Connect (OIDC) authentication flows, from the simplest to the most modern, highlighting the vulnerabilities present in each. We will explore each of the following OpenID Conne...Discuss·61 readsSecurity
Emmanuel GautierforCerberAuthcerberauth.hashnode.dev·Jun 2, 2024OpenID Connect IntroductionOpenID Connect (OIDC) emerges as a robust solution, offering a seamless way to handle user authentication across multiple platforms. If you're familiar with OAuth 2.0, you're already halfway to understanding OpenID Connect. OIDC builds on the OAuth 2...Discuss·50 readsOpenID Connect
Kristof RiebbelsProdotnet.kriebbels.me·May 5, 2024Signature validation required? Microsoft Says No.No signature validation using AddMicrosoftAccount() TLDR; Microsoft's AddMicrosoftAccount() method does not do signature validation for tokens, which poses potential security risks. This article explores the implications of this, using an analogy of ...Discuss·43 readsDotNetEntra