KUNTAL MAITYkuntalmaity.hashnode.dev·Nov 5, 2024difference between access token and refresh tokenWhy tokens? Authentication and Authorization are the crucial steps for protecting user data. Hear token based authentication comes into the picture. There are many authentication methodologies are available but took in based authentication is most po...Discussaccess-token
Reshmaawsresourcetracker.hashnode.dev·Sep 6, 2024Getting Started with Ansible: Automating Server Management and Setting Up Password Less SSH AuthenticationWhat is Ansible ? Ansible is an open-source automation tool that simplifies IT management processes like configuration, deployment, and orchestration. It defines server and application management instructions through simple YAML files known as playbo...DiscussDevops
Chaithrachai005.hashnode.dev·Aug 19, 2024Why Passwordless Authentication is Gaining PopularityEnhancing Endpoint Cybersecurity with Secure Biometrics In today’s digital age, the traditional password-based authentication systems are rapidly becoming outdated and vulnerable to a variety of cyber threats. The proliferation of sophisticated hacki...DiscussPasswordless
Nile Bitsnilebits.hashnode.dev·Jul 3, 2024Django Passwordless Authentication: A Comprehensive Guide with Code ExamplesModern security techniques like passwordless authentication improve user experience by doing away with the necessity for conventional passwords. By using this technique, the likelihood of password-related vulnerabilities including reused passwords, b...Discuss·1 like·32 readsDjango
Rupsa SarkarforBlogs by Team Callchimp.aicallchimp.hashnode.dev·Jun 20, 2024Decrypting Passwordless Login : Build with Callchimp Pt. 3In the ever-evolving landscape of cybersecurity, the quest for secure and user-friendly authentication methods led to the development of Passwordless Login with Voice OTPs. Let's delve into the technical intricacies of this innovative project and exp...Discusscallchimp
Mr. K4l1m3r0k4l1m3r0.hashnode.dev·Jun 13, 2024Password Security: The Ultimate Guide to Creating and Managing Strong PasswordsIn today's digital world, passwords are the primary line of defense for protecting our online accounts. They act as the gatekeepers to our email, social media, banking, and countless other online services. However, weak or easily guessable passwords ...Discuss#cybersecurity
Arnaud Dagneliesblog.passwordless.id·May 26, 2024Passkeys F.A.Q.The WebAuthn protocol is more than 200 pages long, it's complex and gets constantly tweaked. Moreover, the reality of browsers and authenticators have their own quirks and deviate from the official RFC. As such, all information on the web should be t...Discuss·1 like·285 readspasskeys
Pranav ShikarpurforPangea Blogpangea.cloud·Mar 7, 2024Add "Login with Passkeys" to your React.js app in < 2 minsIf you are looking to add passkeys to other languages or frameworks, follow these tutorials: Next.js Django Passkeys, passkeys, passkeys! Everyone's talking about them. With Amazon rolling out passkeys last year and Google encouraging users to m...Discuss·1.7K readsReact
Jackson Markrealtech.hashnode.dev·Feb 29, 2024Embracing the Future: The Rise of Passwordless AuthenticationIn the ever-evolving landscape of digital security, the traditional username-password authentication method has long been the standard. However, with the increasing sophistication of cyber threats and the need for a more seamless user experience, a r...Discusspasswordless authentication
SuperTokenssupertokens.hashnode.dev·Jan 19, 2024The Multifaceted Benefits of Multi-Factor AuthenticationIn 2022, over 80% of data breaches were attributed to compromised passwords. Although email-password based authentication has become the de facto method for authentication, it is very vulnerable to attacks. Through phishing, keylogging or simple brut...DiscussFIDO