Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
authentication
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
OAuth using Better_Auth, nextjs, prisma, shadcn and tailwindcss
Daanish2003
Daanish2003
Daanish2003
Follow
Nov 25 '24
OAuth using Better_Auth, nextjs, prisma, shadcn and tailwindcss
#
typescript
#
betterauth
#
authentication
#
webdev
7
reactions
Comments
Add Comment
15 min read
How to Authenticate Your Google Cloud Project Without a Migraine
Cristina Rodriguez
Cristina Rodriguez
Cristina Rodriguez
Follow
Nov 25 '24
How to Authenticate Your Google Cloud Project Without a Migraine
#
googlecloud
#
authentication
#
machinelearning
#
tensorflow
Comments
Add Comment
3 min read
Secure Your App: 2-Factor Auth in 3 Easy Steps
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 22 '24
Secure Your App: 2-Factor Auth in 3 Easy Steps
#
api
#
app
#
authentication
#
business
1
reaction
Comments
Add Comment
2 min read
React Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21 '24
React Oauth2 Integration with AuthAction
#
authaction
#
oauth
#
authentication
#
webdev
Comments
Add Comment
3 min read
Understanding Upwork's Security Systems: A Deep Technical Dive
Jason Smith
Jason Smith
Jason Smith
Follow
Nov 22 '24
Understanding Upwork's Security Systems: A Deep Technical Dive
#
upwork
#
security
#
machinelearning
#
authentication
32
reactions
Comments
5
comments
2 min read
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Nov 20 '24
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication
#
webdev
#
firebase
#
developertools
#
authentication
Comments
2
comments
3 min read
Implementing One-Time Token Authentication with Spring Security
Raviteja Daggupati
Raviteja Daggupati
Raviteja Daggupati
Follow
Nov 18 '24
Implementing One-Time Token Authentication with Spring Security
#
springboot
#
springsecurity
#
java
#
authentication
6
reactions
Comments
Add Comment
4 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 16 '24
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
#
wep
#
authentication
#
wifisecurity
#
cybersecurity
Comments
Add Comment
3 min read
Integrando Autenticação JWT no Lithe
Lithe
Lithe
Lithe
Follow
Nov 4 '24
Integrando Autenticação JWT no Lithe
#
php
#
jwt
#
lithe
#
authentication
2
reactions
Comments
Add Comment
3 min read
Integrating the JWT Middleware in Lithe
Lithe
Lithe
Lithe
Follow
Nov 4 '24
Integrating the JWT Middleware in Lithe
#
authentication
#
php
#
lithe
#
jwt
2
reactions
Comments
Add Comment
2 min read
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 13 '24
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
#
api
#
authentication
#
it
#
java
Comments
Add Comment
9 min read
ForwardAuth with Traefik: Streamlining Security for Microservices
Tomaz Lovrec
Tomaz Lovrec
Tomaz Lovrec
Follow
Oct 11 '24
ForwardAuth with Traefik: Streamlining Security for Microservices
#
traefik
#
authentication
#
security
#
forwardauth
Comments
Add Comment
6 min read
How to create authenticated routes with the new Expo SDK 51 using Expo Router
DETL INC
DETL INC
DETL INC
Follow
Nov 14 '24
How to create authenticated routes with the new Expo SDK 51 using Expo Router
#
expo
#
router
#
softwaredevelopment
#
authentication
1
reaction
Comments
Add Comment
6 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database
Mustafa Khaled
Mustafa Khaled
Mustafa Khaled
Follow
Oct 10 '24
Why Hashed OTP Tokens Are Better Than Storing Them in a Database
#
otp
#
security
#
authentication
#
optimization
Comments
Add Comment
3 min read
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 13 '24
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
#
authentication
#
2fa
1
reaction
Comments
Add Comment
8 min read
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 8 '24
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
#
authentication
#
java
#
programming
#
language
Comments
Add Comment
2 min read
Vuejs Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21 '24
Vuejs Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
oauth
#
authaction
Comments
Add Comment
3 min read
Angular Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21 '24
Angular Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
authaction
#
oauth
Comments
Add Comment
3 min read
Database Setup, JWT Implementation & API
Michael M.
Michael M.
Michael M.
Follow
Oct 26 '24
Database Setup, JWT Implementation & API
#
postgres
#
jwt
#
authentication
3
reactions
Comments
Add Comment
9 min read
Learn about basic Authentication
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Follow
Nov 5 '24
Learn about basic Authentication
#
authentication
#
backenddevelopment
#
security
2
reactions
Comments
Add Comment
4 min read
Clear illustration of how API Token Authentication works
Daichi Izushi
Daichi Izushi
Daichi Izushi
Follow
Nov 5 '24
Clear illustration of how API Token Authentication works
#
laravel
#
php
#
api
#
authentication
1
reaction
Comments
Add Comment
7 min read
Node.js Authentication: Best Practices and Key Strategies
Sushant Rahate
Sushant Rahate
Sushant Rahate
Follow
Nov 11 '24
Node.js Authentication: Best Practices and Key Strategies
#
javascript
#
authentication
#
node
#
security
40
reactions
Comments
6
comments
6 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
akhil mittal
akhil mittal
akhil mittal
Follow
Oct 14 '24
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
#
authentication
#
oauth
#
authorization
#
eks
1
reaction
Comments
Add Comment
5 min read
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
Jonilss
Jonilss
Jonilss
Follow
Nov 3 '24
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
#
remix
#
go
#
twilio
#
authentication
2
reactions
Comments
2
comments
3 min read
HTTP Basic Auth Explained
Timo Reusch
Timo Reusch
Timo Reusch
Follow
Sep 29 '24
HTTP Basic Auth Explained
#
webdev
#
authentication
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account