DEV Community

# authorization

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Cerbos Review: A Developer's Perspective on Modern Access Control

Cerbos Review: A Developer's Perspective on Modern Access Control

19
Comments
5 min read
Implementing Authorization in a ExpressJS API with AuthAction

Implementing Authorization in a ExpressJS API with AuthAction

Comments
3 min read
Custom Role-Based Access Control in NestJS Using Custom Guards

Custom Role-Based Access Control in NestJS Using Custom Guards

4
Comments
3 min read
Custom Role-Based Authorization with JWT in ASP.NET Core

Custom Role-Based Authorization with JWT in ASP.NET Core

Comments
3 min read
How I'm Learning SpiceDB

How I'm Learning SpiceDB

11
Comments
4 min read
Authorization needs to be dynamic, declarative, and decoupled

Authorization needs to be dynamic, declarative, and decoupled

5
Comments
5 min read
New tools for effortless policy creation and testing in Cerbos Hub

New tools for effortless policy creation and testing in Cerbos Hub

Comments
3 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy

How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy

1
Comments
5 min read
Implementing Authorization in a NestJS API with AuthAction

Implementing Authorization in a NestJS API with AuthAction

Comments
3 min read
OAuth2 Grant Types Explained: Which One Should You Use?

OAuth2 Grant Types Explained: Which One Should You Use?

Comments
4 min read
Implementing OAuth2 for Microservices Authentication

Implementing OAuth2 for Microservices Authentication

Comments
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Comments
5 min read
OAuth2: An In-Depth Overview and How It Works

OAuth2: An In-Depth Overview and How It Works

Comments
4 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
Passkeys, Are passwords obsolete now?!

Passkeys, Are passwords obsolete now?!

4
Comments 1
4 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

2
Comments 1
5 min read
Integrating CASL with React for Robust Authorization

Integrating CASL with React for Robust Authorization

1
Comments
2 min read
Setting Up Keycloak as an OAuth Server

Setting Up Keycloak as an OAuth Server

Comments
3 min read
Understanding Authentication and Authorization in Microservices

Understanding Authentication and Authorization in Microservices

2
Comments
5 min read
Authentication and authorization in Node.js applications

Authentication and authorization in Node.js applications

24
Comments 5
10 min read
Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

2
Comments
4 min read
Protecting Democracy Through Fine-Grained Authorization

Protecting Democracy Through Fine-Grained Authorization

29
Comments 1
4 min read
How to implement authorization in a React application

How to implement authorization in a React application

Comments
3 min read
Authorization in Nestjs API using Auth0 - Step by Step #Series Part-1

Authorization in Nestjs API using Auth0 - Step by Step #Series Part-1

3
Comments
2 min read
We Are Developers World Congress; an Engineer's Travelogue

We Are Developers World Congress; an Engineer's Travelogue

1
Comments
8 min read
Add an authorization layer to your app with Permit.io🔏 in a few minutes ⏱️

Add an authorization layer to your app with Permit.io🔏 in a few minutes ⏱️

56
Comments 11
6 min read
Identity 101: Authentication and Authorization

Identity 101: Authentication and Authorization

1
Comments
7 min read
PBAC vs. Zanzibar For User Authorization

PBAC vs. Zanzibar For User Authorization

1
Comments
3 min read
Unveiling the Future of Authorization with Cerbos

Unveiling the Future of Authorization with Cerbos

Comments
3 min read
The Relationship Between Access Control, Authorization, and Authentication

The Relationship Between Access Control, Authorization, and Authentication

Comments
8 min read
Running Keycloak on Docker for the First Time

Running Keycloak on Docker for the First Time

4
Comments
3 min read
🛡️ Authentication vs Authorization: Every Developer Needs to Know 🛡️

🛡️ Authentication vs Authorization: Every Developer Needs to Know 🛡️

4
Comments
2 min read
Introduction to RBAC in Kubernetes

Introduction to RBAC in Kubernetes

14
Comments 1
5 min read
Building Secure Private Screens in React

Building Secure Private Screens in React

2
Comments
10 min read
How To Build Centralized Authorization System

How To Build Centralized Authorization System

15
Comments
10 min read
Security-charging Your NextJS 14 App with Userfront Authentication

Security-charging Your NextJS 14 App with Userfront Authentication

1
Comments
8 min read
Authentication and Authorization in .NET Core

Authentication and Authorization in .NET Core

2
Comments
5 min read
Automating User Management with Bash Scripting

Automating User Management with Bash Scripting

Comments
10 min read
Simplifying Authentication and Authorization with Keycloak

Simplifying Authentication and Authorization with Keycloak

2
Comments
2 min read
Automating User Management and Permissions on Linux using Bash Scripting

Automating User Management and Permissions on Linux using Bash Scripting

4
Comments
8 min read
How Discord Built `Access!` - An Authorization Management Portal

How Discord Built `Access!` - An Authorization Management Portal

8
Comments
8 min read
Low-Code Backend Solution for Refine.dev Using Prisma and ZenStack

Low-Code Backend Solution for Refine.dev Using Prisma and ZenStack

20
Comments
8 min read
Understanding the Difference Between Authentication and Authorization

Understanding the Difference Between Authentication and Authorization

Comments
3 min read
Google Zanzibar implementations

Google Zanzibar implementations

2
Comments
2 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XV: AVP with Cognito groups

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XV: AVP with Cognito groups

3
Comments
10 min read
Docker container | Resolving "Permission Denied" Woes: A Decade-Long Struggle Unraveled

Docker container | Resolving "Permission Denied" Woes: A Decade-Long Struggle Unraveled

Comments
2 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XIV: AVP Getting Started

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XIV: AVP Getting Started

6
Comments
9 min read
Introduction to Authentication and Authorization

Introduction to Authentication and Authorization

Comments
2 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
Basic Authentication and Authorization

Basic Authentication and Authorization

Comments
2 min read
OAuth 2.0 implementation in Node.js

OAuth 2.0 implementation in Node.js

18
Comments
11 min read
Photogram Authorization

Photogram Authorization

Comments
4 min read
OAuth Terms Explained in One Sentence

OAuth Terms Explained in One Sentence

Comments
2 min read
How to Do Authorization - A Decision Framework: Part 2

How to Do Authorization - A Decision Framework: Part 2

25
Comments
5 min read
JWT Revokation

JWT Revokation

2
Comments 1
3 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XIII: Cloudformation

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XIII: Cloudformation

2
Comments
6 min read
loading...