Smit Bhoraniyasmit-bhoraniya.hashnode.dev·Jul 15, 2023The Power of Access Tokens and Refresh Tokens: A Guide to Secure AuthenticationA token is a piece of data that serves as a representation or proof of authorization. It is typically used to authenticate and validate the identity of a user or a client application in order to grant access to certain resources or perform specific a...10 likes·78 readsaccess-token
Aditya Chaudhariwww.adityatechinsights.com·Jul 8, 2023Why Should I Care About OAuth 2.0? Understand important components in OAUTH2.0 .You've probably heard of OAuth 2.0, but have you ever wondered why it's become such a big deal and how it solves some of our authentication headaches? let's dive into it together! OAuth 2.0 is someone like a loyal mediator that allows different parti...175 readsSystem Design InsightsOAuth2