DEV Community

# authorization

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XII: Terraform

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XII: Terraform

6
Comments
6 min read
How to Do Authorization - A Decision Framework: Part 1

How to Do Authorization - A Decision Framework: Part 1

62
Comments
7 min read
REST API - Basic components of Authorization and Authentication

REST API - Basic components of Authorization and Authentication

Comments
2 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XI: Batch Authorization

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XI: Batch Authorization

2
Comments
7 min read
Implementation of Authorization Middleware with NestJS

Implementation of Authorization Middleware with NestJS

1
Comments
2 min read
🚀 API authorization in API Maker

🚀 API authorization in API Maker

12
Comments
5 min read
Authentication and Authorization

Authentication and Authorization

9
Comments
1 min read
Understanding JWKS (JSON Web Key Set)

Understanding JWKS (JSON Web Key Set)

1
Comments
3 min read
ZenStack: The Complete Authorization Solution for Prisma Projects

ZenStack: The Complete Authorization Solution for Prisma Projects

29
Comments 2
8 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part X: AVP-CLI

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part X: AVP-CLI

7
Comments 1
6 min read
Navigating the Digital Restaurant: A Taste of Authentication and Authorization in JavaScript

Navigating the Digital Restaurant: A Taste of Authentication and Authorization in JavaScript

16
Comments
3 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part IX: Hierarchies and ABAC

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part IX: Hierarchies and ABAC

8
Comments
5 min read
What are Authorization Headers?

What are Authorization Headers?

1
Comments
4 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VIII: Integration with Cognito

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VIII: Integration with Cognito

8
Comments 5
7 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VII: Audit and Pricing

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VII: Audit and Pricing

Comments
5 min read
BoxyHQ + Cerbos: Merging SSO and Authorization

BoxyHQ + Cerbos: Merging SSO and Authorization

1
Comments
10 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part VI - Policy Templates

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part VI - Policy Templates

10
Comments
5 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

63
Comments 3
4 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part V - Test Bench

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part V - Test Bench

1
Comments
6 min read
Simplifying Authentication in Next.js Applications with Clerk

Simplifying Authentication in Next.js Applications with Clerk

8
Comments 3
5 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part IV - Schema

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part IV - Schema

2
Comments
6 min read
Use OPA for Application-Level Authorization, from RBAC to ABAC in Scale

Use OPA for Application-Level Authorization, from RBAC to ABAC in Scale

7
Comments
3 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part III

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part III

4
Comments
8 min read
Why Google Zanzibar Shines at Building Authorization

Why Google Zanzibar Shines at Building Authorization

16
Comments
7 min read
Authorization and Cedar: A New Way to Manage Permissions - Part II

Authorization and Cedar: A New Way to Manage Permissions - Part II

6
Comments
5 min read
Authorization and Cedar: A New Way to Manage Permissions - Part I

Authorization and Cedar: A New Way to Manage Permissions - Part I

15
Comments 3
7 min read
Send SMS Directly from the Browser (No Backend Code Required!)

Send SMS Directly from the Browser (No Backend Code Required!)

Comments
10 min read
Multiple authorization handlers for the same requirement in ASP.NET Core

Multiple authorization handlers for the same requirement in ASP.NET Core

Comments
5 min read
Multi-tenancy authentication done right

Multi-tenancy authentication done right

3
Comments
8 min read
Programmatically evaluating policies in ASP.NET Core

Programmatically evaluating policies in ASP.NET Core

Comments
3 min read
Authorization in .net Core

Authorization in .net Core

7
Comments
6 min read
Protect your GraphQL data with resource_policy

Protect your GraphQL data with resource_policy

2
Comments
6 min read
OAuth 2.0 authorization with desktop application

OAuth 2.0 authorization with desktop application

Comments
7 min read
Attribute level permission control in Rails

Attribute level permission control in Rails

2
Comments
5 min read
Authentication vs. Authorization – What's the Difference?

Authentication vs. Authorization – What's the Difference?

Comments
7 min read
Role-based access control using FastApi

Role-based access control using FastApi

38
Comments 1
2 min read
Default to Deny for More Secure Apps

Default to Deny for More Secure Apps

2
Comments
3 min read
How to create a directive in Angular that renders components only if user is authorized?

How to create a directive in Angular that renders components only if user is authorized?

4
Comments
3 min read
Flow ของ OAuth 2.0

Flow ของ OAuth 2.0

3
Comments
2 min read
Deep linking with Azure Static Web Apps and Easy Auth

Deep linking with Azure Static Web Apps and Easy Auth

2
Comments
5 min read
Azure AD Claims with Static Web Apps and Azure Functions

Azure AD Claims with Static Web Apps and Azure Functions

2
Comments
10 min read
Deep linking with Azure Static Web Apps and Easy Auth

Deep linking with Azure Static Web Apps and Easy Auth

4
Comments
5 min read
Refresh Token Rotation: What, Why and How?

Refresh Token Rotation: What, Why and How?

9
Comments
5 min read
Auth0 Pricing: The Complete Guide [2022]

Auth0 Pricing: The Complete Guide [2022]

6
Comments
4 min read
What is Roles-Based Access Control (RBAC)?

What is Roles-Based Access Control (RBAC)?

3
Comments
3 min read
Encryption, Authentication, and Authorization in Ruby on Rails

Encryption, Authentication, and Authorization in Ruby on Rails

2
Comments
8 min read
Your Auth Cheat Sheet

Your Auth Cheat Sheet

Comments
4 min read
The four mistakes you make building permissions

The four mistakes you make building permissions

23
Comments
9 min read
5 Ways to Improve your AWS IAM Roles and Policies

5 Ways to Improve your AWS IAM Roles and Policies

6
Comments
11 min read
The flexible way to adopt UX/UI in Angular app according to user’s permissions.

The flexible way to adopt UX/UI in Angular app according to user’s permissions.

7
Comments
6 min read
How to Implement Multitenancy in Cloud Computing

How to Implement Multitenancy in Cloud Computing

12
Comments
3 min read
Distributing API Authorization Policies using OPA Bundles

Distributing API Authorization Policies using OPA Bundles

4
Comments
3 min read
OAuth 2.0 and OpenID Connect Explained: Building Secure Authentication Systems

OAuth 2.0 and OpenID Connect Explained: Building Secure Authentication Systems

10
Comments
3 min read
The Complete List of OAuth 2 Grants

The Complete List of OAuth 2 Grants

8
Comments
2 min read
OPAL + OPA VS XACML

OPAL + OPA VS XACML

6
Comments
7 min read
GitHub’s inconsistent access control

GitHub’s inconsistent access control

5
Comments
4 min read
Real-time dynamic authorization - an introduction to OPAL

Real-time dynamic authorization - an introduction to OPAL

5
Comments
6 min read
Revoking Access with a JWT Blacklist/Deny List

Revoking Access with a JWT Blacklist/Deny List

4
Comments
8 min read
Authentication vs Authorization: What’s the Difference?

Authentication vs Authorization: What’s the Difference?

7
Comments
4 min read
Step-up authorization

Step-up authorization

13
Comments
6 min read
loading...