DEV Community

# authentication

User authentication mechanisms

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Auth0 email_verified Was Missing from My Access Token

Why Auth0 email_verified Was Missing from My Access Token

Comments
3 min read
Telegram and the Architectural Shift Toward Access-Layer Authentication

Telegram and the Architectural Shift Toward Access-Layer Authentication

1
Comments
2 min read
JWT vs PASETO v2 vs TECTO: Choosing the Right Token Protocol in 2026

JWT vs PASETO v2 vs TECTO: Choosing the Right Token Protocol in 2026

Comments
6 min read
Auth Tokens Explained: From "Just Ship It" to "Actually Secure"

Auth Tokens Explained: From "Just Ship It" to "Actually Secure"

Comments 1
10 min read
What Exactly is "Authentication": From the Limits of Passwords to FIDO2, Passkeys, and IdP Architecture

What Exactly is "Authentication": From the Limits of Passwords to FIDO2, Passkeys, and IdP Architecture

1
Comments
8 min read
I Built a Django + React Auth Starter So You Don't Have To

I Built a Django + React Auth Starter So You Don't Have To

Comments
15 min read
How I Solved WebSocket Authentication in FastAPI (And Why Depends() Wasn't Enough)

How I Solved WebSocket Authentication in FastAPI (And Why Depends() Wasn't Enough)

2
Comments
7 min read
Building a Stateless Multi-Realm Auth Service: Why Your Auth Gateway Doesn't Need a Database

Building a Stateless Multi-Realm Auth Service: Why Your Auth Gateway Doesn't Need a Database

Comments
9 min read
5 Login Failures That Hurt Conversion

5 Login Failures That Hurt Conversion

Comments
3 min read
How Passkeys Improve Retention: Why Keychains Keep Users Coming Back

How Passkeys Improve Retention: Why Keychains Keep Users Coming Back

Comments
3 min read
OpenID Connect Core 1.0 Deep Dive: Understanding the "Authentication" Layer on top of OAuth 2.0

OpenID Connect Core 1.0 Deep Dive: Understanding the "Authentication" Layer on top of OAuth 2.0

3
Comments
15 min read
Designing an Authentication System: OAuth and SSO

Designing an Authentication System: OAuth and SSO

Comments
8 min read
Passkeys 2026: Adoption Is Exploding — But Access Architecture Still Decides Security

Passkeys 2026: Adoption Is Exploding — But Access Architecture Still Decides Security

2
Comments
3 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

Architectural Asymmetry in Authentication: Part 2 — Risk Before Context

3
Comments
2 min read
How Passkeys Improve Conversion Rate: Checkout Levers and Adoption Metrics

How Passkeys Improve Conversion Rate: Checkout Levers and Adoption Metrics

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.