Maheshwar Ligadefortechwastitechwasti.com·Jan 8, 2024Building a Secure REST API with GORM, Echo, JWT Token Authentication, and PostgreSQL in Go.Combining GORM, a robust ORM library for Go, with Echo, a high-performance web framework, along with JWT token-based authentication and PostgreSQL, offers a solid foundation for developing secure and scalable RESTful APIs. In this detailed tutorial, ...Discuss·450 readsgo-languageGo Language
Musaib Altafmusaaib.hashnode.dev·Dec 24, 2023Django Registration Wizardry: Strengthening Security with Email OTP Verification1. Introduction Django is a python-based high level web framework. It's an open source framework and is free to use. If we talk about the architecture, it follows the MVT (Model View Template) architecture. In this article, I assume that you already ...Discuss·5 likes·188 readsDjango registration system
Nancy Okekenancyokeke.hashnode.dev·Aug 11, 2023Securing Your Node.js App: A Deep Dive into Effective Authentication TechniquesAuthentication plays a pivotal role in the security of modern web applications, ensuring a safe and personalized user experience. It involves the verification of user identities and permissions, safeguarding sensitive data and resources from unauthor...Discuss·56 likes·288 readsJavaScript
Fadhili NjagiforNixqueblog.nixque.com·Aug 6, 2023How to setup MySQL on a Linux VPSSo you've made an awesome backend or full-stack application, powered by a MySQL database. You are pretty happy with your work and are ready to take it to production. You are deploying it to a Linux Virtual Private Server (VPS) and you have no idea ho...Discuss·102 readsLinux
Lavish Goyalpandazblog.hashnode.dev·Jun 24, 2023How to perform Encryption-Decryption in Web AppsSometimes in your web application, you need to expose some data to the client's browser but need it back with the subsequent API requests made but also sensitive data and you don't want the user to manipulate or understand it. Here comes the signific...Discuss·79 readsNode.js
Daniel Wagnerwagnus.hashnode.dev·Feb 5, 2023Realms and users - Part 3In this post, we will look at realms and users in Keycloak. Before we start creating these things, we should familiarize ourselves with these terms from the Keycloak universe. What is a realm? A realm is a logical boundary that represents a set of us...Discuss·107 readsSecure applications with Keycloakkeycloak
Daniel Wagnerwagnus.hashnode.dev·Feb 4, 2023Getting started with Keycloak - Part 2In this post, we will look at how to start the Keycloak server on your local machine in developer mode. This developer mode is not suitable or intended for use in a production environment. However, it is perfectly sufficient for our first experiments...Discuss·681 readsSecure applications with Keycloakkeycloak
Daniel Wagnerwagnus.hashnode.dev·Feb 4, 2023Introduction to Keycloak - Part 1Keycloak is an open-source identity and access management solution from Red Hat that provides a centralized platform for authentication and authorization. It acts as a Single Sign-On (SSO) solution for web and mobile applications and also provides se...Discuss·98 readsSecure applications with KeycloakSecurity
Yash Mistryyash240408.hashnode.dev·Jan 24, 2023Basics Inception of API for StarterWhat do you mean by API? Application Programming Interface is referred to as API. Any software having a specific function is referred to be an application when discussing APIs. The interface can be compared to a service agreement between two programs...Discuss·47 readsREST API
Ashok VangaforAshok Vblock360.hashnode.dev·Jan 23, 2023Secure Your RESTful APIsCreating an API is simple, the next thing that comes along with it is securing it. If API is vulnerable, the users’ sensitive information will be at risk some of the Attacks that hackers can use against your API: Code injection Cross-site scripting...Discuss·36 readsSecure restful Api