DEV Community

# authentication

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Authenticate Your Google Cloud Project Without a Migraine

How to Authenticate Your Google Cloud Project Without a Migraine

Comments
3 min read
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication

Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication

Comments
3 min read
É seguro guardar dados do usuário no localStorage?

É seguro guardar dados do usuário no localStorage?

Comments
3 min read
Understanding Authentication: Session-Based vs. Token-Based (and Beyond!)

Understanding Authentication: Session-Based vs. Token-Based (and Beyond!)

Comments
3 min read
Implementing One-Time Token Authentication with Spring Security

Implementing One-Time Token Authentication with Spring Security

1
Comments
4 min read
How to create authenticated routes with the new Expo SDK 51 using Expo Router

How to create authenticated routes with the new Expo SDK 51 using Expo Router

Comments
6 min read
How spoken.host Simplifies Spotify API Authentication

How spoken.host Simplifies Spotify API Authentication

Comments
3 min read
Clear illustration of how API Token Authentication works

Clear illustration of how API Token Authentication works

Comments
7 min read
Understanding Upwork's Security Systems: A Deep Technical Dive

Understanding Upwork's Security Systems: A Deep Technical Dive

22
Comments 4
2 min read
TADOConnection: Proper Use of LoginPrompt

TADOConnection: Proper Use of LoginPrompt

Comments
1 min read
🔐 Benefits and Drawbacks of Passkey-Only Login Systems

🔐 Benefits and Drawbacks of Passkey-Only Login Systems

Comments
2 min read
Secure Your App: 2-Factor Auth in 3 Easy Steps

Secure Your App: 2-Factor Auth in 3 Easy Steps

1
Comments
2 min read
React Oauth2 Integration with AuthAction

React Oauth2 Integration with AuthAction

Comments
3 min read
Ruby on Rails: Autenticação utilizando Devise + Keycloak

Ruby on Rails: Autenticação utilizando Devise + Keycloak

Comments
3 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes

WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes

Comments
3 min read
Integrando Autenticação JWT no Lithe

Integrando Autenticação JWT no Lithe

5
Comments
3 min read
Integrating the JWT Middleware in Lithe

Integrating the JWT Middleware in Lithe

2
Comments
2 min read
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT

Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT

Comments
9 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Comments
3 min read
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know

The Drawbacks of Two-Factor Authentication (2FA) You Need to Know

6
Comments
8 min read
Protect Your App in 5 Minutes: OAuth Tokens Made Easy

Protect Your App in 5 Minutes: OAuth Tokens Made Easy

Comments
2 min read
Vuejs Oauth2 Integration with AuthAction

Vuejs Oauth2 Integration with AuthAction

Comments
3 min read
Angular Oauth2 Integration with AuthAction

Angular Oauth2 Integration with AuthAction

Comments
3 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Comments
4 min read
Database Setup, JWT Implementation & API

Database Setup, JWT Implementation & API

3
Comments
9 min read
Learn about basic Authentication

Learn about basic Authentication

2
Comments
4 min read
Node.js Authentication: Best Practices and Key Strategies

Node.js Authentication: Best Practices and Key Strategies

39
Comments 6
6 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy

How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy

1
Comments
5 min read
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix

Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix

2
Comments
3 min read
HTTP Basic Auth Explained

HTTP Basic Auth Explained

Comments
2 min read
OAuth2 Grant Types Explained: Which One Should You Use?

OAuth2 Grant Types Explained: Which One Should You Use?

Comments
4 min read
Implementing OAuth2 for Microservices Authentication

Implementing OAuth2 for Microservices Authentication

Comments
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Comments
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It

OAuth2 Client Credentials Grant Type: When and How to Use It

Comments
4 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Comments
4 min read
Spring Security: Implementing JWT Authentication in Your Java Application

Spring Security: Implementing JWT Authentication in Your Java Application

Comments
4 min read
OAuth2: An In-Depth Overview and How It Works

OAuth2: An In-Depth Overview and How It Works

Comments
4 min read
Passwordless Authentication

Passwordless Authentication

Comments
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
What is SCIM Provisioning: In-Depth Guide [2024]

What is SCIM Provisioning: In-Depth Guide [2024]

23
Comments 1
12 min read
Authentication and Authorization Techniques in Modern Web Applications

Authentication and Authorization Techniques in Modern Web Applications

1
Comments
4 min read
Django API Project Setup

Django API Project Setup

Comments
5 min read
Create a Simple Authentication System for your Next Application with Clerk

Create a Simple Authentication System for your Next Application with Clerk

3
Comments
9 min read
How to Generate and Verify OTPs in Next.js

How to Generate and Verify OTPs in Next.js

Comments
4 min read
An Overview of the Kalp Studio Authentication

An Overview of the Kalp Studio Authentication

5
Comments
4 min read
Introduction to Smart Wallets and Passkeys authentication

Introduction to Smart Wallets and Passkeys authentication

Comments
9 min read
Building Secure Systems for Modern Applications

Building Secure Systems for Modern Applications

4
Comments
3 min read
JWT, OAuth, OpenID Connect, and Azure AD: Authentication Levels

JWT, OAuth, OpenID Connect, and Azure AD: Authentication Levels

Comments
4 min read
Why You Should Use JSON Web Tokens (JWT) for Your Applications?

Why You Should Use JSON Web Tokens (JWT) for Your Applications?

Comments
3 min read
Instalando Keycloak usando Docker

Instalando Keycloak usando Docker

1
Comments
3 min read
Making Passwords Optional: What You Need to Know

Making Passwords Optional: What You Need to Know

3
Comments
3 min read
Implementing Authentication with Clerk in Next.js

Implementing Authentication with Clerk in Next.js

5
Comments
3 min read
Securing Your Website with Basic Auth for NGINX

Securing Your Website with Basic Auth for NGINX

1
Comments
4 min read
First post: Openfav-auth, an(other) Astro app template

First post: Openfav-auth, an(other) Astro app template

Comments 2
1 min read
Mastering Modern Authentication in Web Applications: OAuth 2.0 Demystified

Mastering Modern Authentication in Web Applications: OAuth 2.0 Demystified

5
Comments
11 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments 1
6 min read
Guide: How to Add Passkeys to Enterprise Systems

Guide: How to Add Passkeys to Enterprise Systems

1
Comments
3 min read
loading...