Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
authorization
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Implementing OAuth2 for Microservices Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31 '24
Implementing OAuth2 for Microservices Authentication
#
api
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
#
security
#
spring
#
authentication
#
authorization
Comments
Add Comment
5 min read
OAuth2: An In-Depth Overview and How It Works
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
OAuth2: An In-Depth Overview and How It Works
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
#
security
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
3 min read
OAuth2: Understanding the Client Credentials Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
OAuth2: Understanding the Client Credentials Grant Type
#
security
#
authentication
#
authorization
#
clientcredentials
1
reaction
Comments
Add Comment
2 min read
OAuth2: Understanding the Authorization Code Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
OAuth2: Understanding the Authorization Code Grant Type
#
security
#
authentication
#
authorization
#
authorizationcode
Comments
Add Comment
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
OAuth2 Demystified: An Introduction to Secure Authorization
#
security
#
sauthentication
#
authorization
#
oauth2
Comments
Add Comment
3 min read
Understanding the Differences Between Authentication and Authorization
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Understanding the Differences Between Authentication and Authorization
#
security
#
sauthentication
#
authorization
Comments
Add Comment
2 min read
Passkeys, Are passwords obsolete now?!
Atharva_404
Atharva_404
Atharva_404
Follow
Oct 14 '24
Passkeys, Are passwords obsolete now?!
#
passkeys
#
passwords
#
authenticaion
#
authorization
4
reactions
Comments
1
comment
4 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 10 '24
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications
#
authentication
#
authorization
#
security
2
reactions
Comments
1
comment
5 min read
Setting Up Keycloak as an OAuth Server
Samuel Mutemi
Samuel Mutemi
Samuel Mutemi
Follow
Aug 28 '24
Setting Up Keycloak as an OAuth Server
#
keycloak
#
authorization
#
oauth
#
opensource
Comments
Add Comment
3 min read
Understanding Authentication and Authorization in Microservices
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Follow
Sep 26 '24
Understanding Authentication and Authorization in Microservices
#
authentication
#
authorization
#
microservices
2
reactions
Comments
Add Comment
5 min read
Authentication and authorization in Node.js applications
Dan
Dan
Dan
Follow
for
Cerbos
Oct 8 '24
Authentication and authorization in Node.js applications
#
authorization
#
node
#
tutorial
#
express
25
reactions
Comments
6
comments
10 min read
Authentication and Authorization: Best Practices for Securing Web Applications
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 15 '24
Authentication and Authorization: Best Practices for Securing Web Applications
#
authorization
#
authentication
#
cybersecurity
#
developertips
3
reactions
Comments
Add Comment
4 min read
Protecting Democracy Through Fine-Grained Authorization
Daniel Bass
Daniel Bass
Daniel Bass
Follow
for
Permit.io
Aug 22 '24
Protecting Democracy Through Fine-Grained Authorization
#
fga
#
authorization
#
programming
#
security
29
reactions
Comments
1
comment
4 min read
How to implement authorization in a React application
Anna
Anna
Anna
Follow
Sep 6 '24
How to implement authorization in a React application
#
react
#
authorization
#
cerbos
Comments
Add Comment
3 min read
Authorization in Nestjs API using Auth0 - Step by Step #Series Part-1
tkssharma
tkssharma
tkssharma
Follow
Sep 6 '24
Authorization in Nestjs API using Auth0 - Step by Step #Series Part-1
#
nestjs
#
authorization
#
microservices
#
node
11
reactions
Comments
Add Comment
2 min read
We Are Developers World Congress; an Engineer's Travelogue
Dan
Dan
Dan
Follow
for
Cerbos
Aug 7 '24
We Are Developers World Congress; an Engineer's Travelogue
#
conference
#
humour
#
authorization
1
reaction
Comments
Add Comment
8 min read
Add an authorization layer to your app with Permit.io🔏 in a few minutes ⏱️
Rohan Sharma
Rohan Sharma
Rohan Sharma
Follow
Sep 3 '24
Add an authorization layer to your app with Permit.io🔏 in a few minutes ⏱️
#
node
#
javascript
#
authorization
#
tutorial
57
reactions
Comments
11
comments
6 min read
Identity 101: Authentication and Authorization
Joe Chen
Joe Chen
Joe Chen
Follow
Sep 4 '24
Identity 101: Authentication and Authorization
#
authentication
#
authorization
1
reaction
Comments
Add Comment
7 min read
PBAC vs. Zanzibar For User Authorization
Anna
Anna
Anna
Follow
Sep 4 '24
PBAC vs. Zanzibar For User Authorization
#
authorization
#
zanzibar
#
learning
#
backend
1
reaction
Comments
Add Comment
3 min read
Integrating CASL with React for Robust Authorization
Shili Mrawen
Shili Mrawen
Shili Mrawen
Follow
Sep 3 '24
Integrating CASL with React for Robust Authorization
#
casl
#
authorization
#
javascript
#
react
2
reactions
Comments
Add Comment
2 min read
Unveiling the Future of Authorization with Cerbos
Anna
Anna
Anna
Follow
Aug 30 '24
Unveiling the Future of Authorization with Cerbos
#
authorization
#
security
#
softwareengineering
#
podcast
Comments
1
comment
3 min read
The Relationship Between Access Control, Authorization, and Authentication
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Aug 23 '24
The Relationship Between Access Control, Authorization, and Authentication
#
accesscontrol
#
authorization
#
authentication
1
reaction
Comments
Add Comment
8 min read
Running Keycloak on Docker for the First Time
Samuel Mutemi
Samuel Mutemi
Samuel Mutemi
Follow
Aug 19 '24
Running Keycloak on Docker for the First Time
#
authentication
#
authorization
#
docker
#
microservices
4
reactions
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account