Victoria LoforArticles by Victoria Lovictoria.hashnode.net·Aug 22, 2020Introduction to REST API Authentication MethodsHello devs! In this article, I'll be discussing some common ways to authenticate your API as a way to protect your routes from users that shouldn't access them. Why should I protect my routes? Certain routes such as your user's profile page or the ad...Chigbogu Orji and 2 others are discussing this3 people are discussing thisDiscuss·98 likes·10.0K readsREST API
Deborah EmeniforDeborah Emeni's Blogdebbie.hashnode.net·Nov 26, 2020A Beginners guide to User Authentication and Authorization with JSON WEB TOKENS versus Sessions in NodeJsIn a web server, authentication (https://g.co/kgs/Yy9RH2) is used to verify a user in the client-side trying to access the database or the site. The server can achieve this in various ways but in most cases, the server uses the user's information li...Discuss·88 likes·2.1K readsnodejs
Spiff Jekey-GreenforSpiffGreen's Blogspiffgreen.hashnode.net·Jun 7, 2022Role-Based Authorization in NodeJsYou've probably encountered apps or programs that provide services to users based on their role or membership type. An excellent example is when a system's account types are divided into three categories: free, basic, and premium, where each account ...Victor Eke and 3 others are discussing this4 people are discussing thisDiscuss·80 likes·5.4K readsNode.jswow, really good explaination. Keep up the good work !! 3
Sandeep KorrapatiforSandeep's Tech Blogphoenixdev.hashnode.net·Apr 23, 2023The OAuth 2.0 Odyssey: A Delightful Adventure into Web App SecurityIntroduction Ahoy, fellow explorers! Are you ready to embark on an epic journey through the fascinating world of OAuth 2.0? With this Hashnode blog post as your trusty compass, we'll navigate the vast ocean of this powerful authorization framework in...DiscussOAuth2
pratyush bohidarforPratyush's blog pratyush021.hashnode.net·Apr 13, 2023What is csrf, and why do we disable it in our Authorization microservice?CSRF stands for Cross-Site Request Forgery. When we make a request to a website, the website validates the request and sends a confirmation that we are authenticated. Along with the confirmation response, the website sends us some cookies, that are s...Discuss·1 likeSpringboot
Emmanuel GautierforCerberAuthemmanuelgautier-1676898909609.hashnode.net·Apr 5, 2023Understanding OpenID Connect and OAuth2 Grant Types: A Comprehensive GuideIn today's digital world, securing web applications and APIs is essential to protect user data and prevent unauthorized access. OAuth2 and OpenID Connect are two popular authentication and authorization protocols that enable secure access to web appl...Discuss·30 readsMastering OAuth2 and OpenID Connect for Secure Authentication and Authorizationoauth
VIVEK RAJYAGURUforThe Code Craftersvivekrajyaguru.hashnode.net·Apr 2, 2023Step-by-Step Guide to Implementing OAuth2 in a Node.js ApplicationOAuth2 is an authorization framework that allows applications to access a user’s resources stored in another application without the need to share the user’s credentials. In this blog post, we will go through the process of implementing OAuth2 in a N...DiscussNode.js
EthanforDevelopment Diaryethan91.hashnode.net·Mar 26, 2023Implementing Basic Authorization With LaravelIntroduction Hello! In this tutorial I will show you how to implement basic authorization using the laravel framework. 😃 Requirements For this tutorial you will need the following: PHP and composer installed on your system (The installation proces...DiscussLaravel
Emmanuel GautierforCerberAuthemmanuelgautier-1676898909609.hashnode.net·Mar 23, 2023What are OpenId Connect prompts?Technically, the OpenId Connect prompt is a parameter that can be included in the authentication request to control the behavior of the authentication flow. The prompt parameter allows a relying party (RP) to request specific interactions with the us...Discuss·35 readsMastering OAuth2 and OpenID Connect for Secure Authentication and AuthorizationOpenID Connect
Tony TangforTony Tang Devtonytangdev.hashnode.net·Mar 19, 2023How AWS Cognito is like a Nightclub Bouncer: A Beginner's Guide to User Authentication and Access ControlWhen it comes to building web or mobile applications, user authentication and access control are critical components of the user experience and security. That's where AWS Cognito comes in. AWS Cognito is a managed service from Amazon Web Services tha...DiscussAWS
Chinaemerem ObidooforChimexis Tech Blogchimexis10.hashnode.net·Mar 19, 2023Understanding IAM Policies and Permissions in AWS.User authentication and authorization are core features of Amazon Web Services (AWS). Together, these processes determine whether a principal can access AWS resources. A principal in this sense refers to a person or an application capable of requesti...Discuss·26 readsAWS
Aditya Sutarforadityaoo7.hashnode.net·Mar 19, 2023Authentication & Authorization in Kubernetes - Nginx Plus Ingress Controller with OIDC policy"Secure your applications, not your network. Verify identity and enforce access controls in the application itself, where they can travel with the application wherever it goes." - John Kindervag, creator of the Zero Trust security model. Introductio...DiscussKubernetes
Godwin AmadiforTech With Godwingodwinamadi-nj.hashnode.net·Mar 18, 2023Build and Dockerize a Node JS Inventory APP.Things you will learn; Build Inventory API with Node JS, Authentication and Authorization in Node JS, How to Dockerize a Node JS APP, How to push a docker image to docker Hub, Setting up Node JS(Unit-Inventory) Application. Create a folder on y...Discuss·2 likes·51 readsNode.js