Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
authentication
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
É seguro guardar dados do usuário no localStorage?
Breno
Breno
Breno
Follow
Nov 15
É seguro guardar dados do usuário no localStorage?
#
supabase
#
authentication
#
localstorage
#
javascript
Comments
Add Comment
3 min read
Understanding Authentication: Session-Based vs. Token-Based (and Beyond!)
Usool
Usool
Usool
Follow
Nov 15
Understanding Authentication: Session-Based vs. Token-Based (and Beyond!)
#
webdev
#
react
#
flask
#
authentication
Comments
Add Comment
3 min read
Implementing One-Time Token Authentication with Spring Security
Raviteja Daggupati
Raviteja Daggupati
Raviteja Daggupati
Follow
Nov 18
Implementing One-Time Token Authentication with Spring Security
#
springboot
#
springsecurity
#
java
#
authentication
1
reaction
Comments
Add Comment
4 min read
How to create authenticated routes with the new Expo SDK 51 using Expo Router
DETL INC
DETL INC
DETL INC
Follow
Nov 14
How to create authenticated routes with the new Expo SDK 51 using Expo Router
#
expo
#
router
#
softwaredevelopment
#
authentication
Comments
Add Comment
6 min read
How spoken.host Simplifies Spotify API Authentication
Dogan
Dogan
Dogan
Follow
Nov 13
How spoken.host Simplifies Spotify API Authentication
#
spotify
#
api
#
accesstoken
#
authentication
Comments
Add Comment
3 min read
Clear illustration of how API Token Authentication works
Daichi Izushi
Daichi Izushi
Daichi Izushi
Follow
Nov 5
Clear illustration of how API Token Authentication works
#
laravel
#
php
#
api
#
authentication
Comments
Add Comment
7 min read
OAuth2 Grant Types Explained: Which One Should You Use?
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31
OAuth2 Grant Types Explained: Which One Should You Use?
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
OAuth2 Client Credentials Grant Type: When and How to Use It
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2 Client Credentials Grant Type: When and How to Use It
#
security
#
authentication
#
clientcredentials
#
oauth2
Comments
Add Comment
4 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide
#
security
#
spring
#
api
#
authentication
Comments
Add Comment
4 min read
OAuth2: An In-Depth Overview and How It Works
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: An In-Depth Overview and How It Works
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Spring Security: Implementing JWT Authentication in Your Java Application
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Spring Security: Implementing JWT Authentication in Your Java Application
#
security
#
spring
#
authentication
#
jwt
Comments
Add Comment
4 min read
Passwordless Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Passwordless Authentication
#
security
#
passwordless
#
authentication
Comments
Add Comment
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
#
security
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
3 min read
OAuth2: Understanding the Authorization Code Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: Understanding the Authorization Code Grant Type
#
security
#
authentication
#
authorization
#
authorizationcode
Comments
Add Comment
3 min read
OAuth2: Understanding the Client Credentials Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: Understanding the Client Credentials Grant Type
#
security
#
authentication
#
authorization
#
clientcredentials
1
reaction
Comments
Add Comment
2 min read
TADOConnection: Proper Use of LoginPrompt
Dejan Dozet
Dejan Dozet
Dejan Dozet
Follow
Oct 30
TADOConnection: Proper Use of LoginPrompt
#
delphi
#
authentication
#
bestpractices
#
pascal
Comments
Add Comment
1 min read
🔐 Benefits and Drawbacks of Passkey-Only Login Systems
sateshcharan
sateshcharan
sateshcharan
Follow
Oct 27
🔐 Benefits and Drawbacks of Passkey-Only Login Systems
#
passkey
#
hanko
#
authentication
#
credentials
Comments
Add Comment
2 min read
Django API Project Setup
Saad Alkentar
Saad Alkentar
Saad Alkentar
Follow
Oct 28
Django API Project Setup
#
python
#
django
#
authentication
Comments
Add Comment
5 min read
How to Generate and Verify OTPs in Next.js
Hadiza Mohammed
Hadiza Mohammed
Hadiza Mohammed
Follow
Oct 24
How to Generate and Verify OTPs in Next.js
#
nextjs
#
typescript
#
authentication
#
redis
Comments
Add Comment
4 min read
Secure Your App: 2-Factor Auth in 3 Easy Steps
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 22
Secure Your App: 2-Factor Auth in 3 Easy Steps
#
api
#
app
#
authentication
#
business
1
reaction
Comments
Add Comment
2 min read
React Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
React Oauth2 Integration with AuthAction
#
authaction
#
oauth
#
authentication
#
webdev
Comments
Add Comment
3 min read
Implementing OAuth2 for Microservices Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31
Implementing OAuth2 for Microservices Authentication
#
api
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Ruby on Rails: Autenticação utilizando Devise + Keycloak
Alef Ojeda de Oliveira
Alef Ojeda de Oliveira
Alef Ojeda de Oliveira
Follow
Oct 16
Ruby on Rails: Autenticação utilizando Devise + Keycloak
#
ruby
#
rails
#
devise
#
authentication
Comments
Add Comment
3 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 16
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
#
wep
#
authentication
#
wifisecurity
#
cybersecurity
Comments
Add Comment
3 min read
Integrando Autenticação JWT no Lithe
Lithe
Lithe
Lithe
Follow
Nov 4
Integrando Autenticação JWT no Lithe
#
php
#
jwt
#
lithe
#
authentication
6
reactions
Comments
Add Comment
3 min read
Integrating the JWT Middleware in Lithe
Lithe
Lithe
Lithe
Follow
Nov 4
Integrating the JWT Middleware in Lithe
#
authentication
#
php
#
lithe
#
jwt
2
reactions
Comments
Add Comment
2 min read
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 13
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
#
api
#
authentication
#
it
#
java
Comments
Add Comment
9 min read
ForwardAuth with Traefik: Streamlining Security for Microservices
Tomaz Lovrec
Tomaz Lovrec
Tomaz Lovrec
Follow
Oct 11
ForwardAuth with Traefik: Streamlining Security for Microservices
#
traefik
#
authentication
#
security
#
forwardauth
Comments
Add Comment
6 min read
ForwardAuth with Traefik: Streamlining Security for Microservices
Tomaz Lovrec
Tomaz Lovrec
Tomaz Lovrec
Follow
Oct 11
ForwardAuth with Traefik: Streamlining Security for Microservices
#
traefik
#
authentication
#
security
#
forwardauth
Comments
Add Comment
6 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database
Mustafa Khaled
Mustafa Khaled
Mustafa Khaled
Follow
Oct 10
Why Hashed OTP Tokens Are Better Than Storing Them in a Database
#
otp
#
security
#
authentication
#
optimization
Comments
Add Comment
3 min read
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 13
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
#
authentication
#
2fa
6
reactions
Comments
Add Comment
8 min read
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 8
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
#
authentication
#
java
#
programming
#
language
Comments
Add Comment
2 min read
Vuejs Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
Vuejs Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
oauth
#
authaction
Comments
Add Comment
3 min read
Angular Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
Angular Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
authaction
#
oauth
Comments
Add Comment
3 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth
Yu Hamada
Yu Hamada
Yu Hamada
Follow
Oct 29
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth
#
webdev
#
beginners
#
security
#
authentication
Comments
Add Comment
4 min read
Database Setup, JWT Implementation & API
Michael M.
Michael M.
Michael M.
Follow
Oct 26
Database Setup, JWT Implementation & API
#
postgres
#
jwt
#
authentication
3
reactions
Comments
Add Comment
9 min read
Learn about basic Authentication
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Follow
Nov 5
Learn about basic Authentication
#
authentication
#
backenddevelopment
#
security
2
reactions
Comments
Add Comment
4 min read
Node.js Authentication: Best Practices and Key Strategies
Sushant Rahate
Sushant Rahate
Sushant Rahate
Follow
Nov 11
Node.js Authentication: Best Practices and Key Strategies
#
javascript
#
authentication
#
node
#
security
38
reactions
Comments
6
comments
6 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
akhil mittal
akhil mittal
akhil mittal
Follow
Oct 14
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
#
authentication
#
oauth
#
authorization
#
eks
1
reaction
Comments
Add Comment
5 min read
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
dio arafi
dio arafi
dio arafi
Follow
Nov 3
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
#
remix
#
go
#
twilio
#
authentication
2
reactions
Comments
Add Comment
3 min read
HTTP Basic Auth Explained
Timo Reusch
Timo Reusch
Timo Reusch
Follow
Sep 29
HTTP Basic Auth Explained
#
webdev
#
authentication
Comments
Add Comment
2 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
#
security
#
spring
#
authentication
#
authorization
Comments
Add Comment
5 min read
What is SCIM Provisioning: In-Depth Guide [2024]
Ege Aytin
Ege Aytin
Ege Aytin
Follow
for
Permify
Oct 29
What is SCIM Provisioning: In-Depth Guide [2024]
#
webdev
#
cloud
#
tutorial
#
authentication
23
reactions
Comments
1
comment
12 min read
Authentication and Authorization Techniques in Modern Web Applications
Obinna
Obinna
Obinna
Follow
Oct 28
Authentication and Authorization Techniques in Modern Web Applications
#
authentication
#
jwt
#
oauth
#
websecurity
1
reaction
Comments
Add Comment
4 min read
Create a Simple Authentication System for your Next Application with Clerk
DrPrime01
DrPrime01
DrPrime01
Follow
Oct 26
Create a Simple Authentication System for your Next Application with Clerk
#
webdev
#
authentication
#
clerk
#
nextjs
3
reactions
Comments
Add Comment
9 min read
An Overview of the Kalp Studio Authentication
Asjad Ahmed Khan
Asjad Ahmed Khan
Asjad Ahmed Khan
Follow
for
Kalp Studio
Oct 23
An Overview of the Kalp Studio Authentication
#
sso
#
authentication
#
security
#
web3
5
reactions
Comments
Add Comment
4 min read
Introduction to Smart Wallets and Passkeys authentication
Irena Popova 👩🏻💻
Irena Popova 👩🏻💻
Irena Popova 👩🏻💻
Follow
Oct 23
Introduction to Smart Wallets and Passkeys authentication
#
authentication
#
cryptocurrency
#
passkeys
#
wallets
Comments
Add Comment
9 min read
Building Secure Systems for Modern Applications
Michael M.
Michael M.
Michael M.
Follow
Oct 22
Building Secure Systems for Modern Applications
#
authentication
#
security
4
reactions
Comments
Add Comment
3 min read
JWT, OAuth, OpenID Connect, and Azure AD: Authentication Levels
DotNet Full Stack Dev
DotNet Full Stack Dev
DotNet Full Stack Dev
Follow
Oct 21
JWT, OAuth, OpenID Connect, and Azure AD: Authentication Levels
#
dotnet
#
csharp
#
authentication
#
jwt
Comments
Add Comment
4 min read
Why You Should Use JSON Web Tokens (JWT) for Your Applications?
Marvyn Harryson
Marvyn Harryson
Marvyn Harryson
Follow
Oct 6
Why You Should Use JSON Web Tokens (JWT) for Your Applications?
#
jwt
#
authentication
#
api
#
dotnet
Comments
Add Comment
3 min read
Instalando Keycloak usando Docker
Alef Ojeda de Oliveira
Alef Ojeda de Oliveira
Alef Ojeda de Oliveira
Follow
Oct 16
Instalando Keycloak usando Docker
#
docker
#
keycloak
#
authentication
#
webdev
1
reaction
Comments
Add Comment
3 min read
Making Passwords Optional: What You Need to Know
Teddy ASSIH
Teddy ASSIH
Teddy ASSIH
Follow
Oct 15
Making Passwords Optional: What You Need to Know
#
security
#
hanko
#
passkey
#
authentication
3
reactions
Comments
Add Comment
3 min read
Implementing Authentication with Clerk in Next.js
Atsushi Miyamoto
Atsushi Miyamoto
Atsushi Miyamoto
Follow
Oct 14
Implementing Authentication with Clerk in Next.js
#
nextjs
#
clerk
#
authentication
#
reacthookform
5
reactions
Comments
Add Comment
3 min read
Securing Your Website with Basic Auth for NGINX
Nasrul Hazim Bin Mohamad
Nasrul Hazim Bin Mohamad
Nasrul Hazim Bin Mohamad
Follow
Oct 3
Securing Your Website with Basic Auth for NGINX
#
nginx
#
security
#
authentication
1
reaction
Comments
Add Comment
4 min read
First post: Openfav-auth, an(other) Astro app template
DoubleFacess
DoubleFacess
DoubleFacess
Follow
Oct 13
First post: Openfav-auth, an(other) Astro app template
#
astro
#
supabase
#
authentication
#
javascript
Comments
2
comments
1 min read
Mastering Modern Authentication in Web Applications: OAuth 2.0 Demystified
Emmanuel Obiezue
Emmanuel Obiezue
Emmanuel Obiezue
Follow
Sep 21
Mastering Modern Authentication in Web Applications: OAuth 2.0 Demystified
#
authentication
#
oauth
5
reactions
Comments
Add Comment
11 min read
Guide: How to Add Passkeys to Enterprise Systems
vdelitz
vdelitz
vdelitz
Follow
for
Corbado
Sep 30
Guide: How to Add Passkeys to Enterprise Systems
#
enterprise
#
passkeys
#
cybersecurity
#
authentication
1
reaction
Comments
Add Comment
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 10
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications
#
authentication
#
authorization
#
security
2
reactions
Comments
1
comment
5 min read
Mastering GitLab with SSH Key: A Step-by-Step Guide for Secure Authentication
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 10
Mastering GitLab with SSH Key: A Step-by-Step Guide for Secure Authentication
#
gitlab
#
ssh
#
secure
#
authentication
2
reactions
Comments
Add Comment
3 min read
The Ultimate Guide to Understanding Web Application Authentication
Carrie
Carrie
Carrie
Follow
Oct 9
The Ultimate Guide to Understanding Web Application Authentication
#
authentication
#
webapplication
#
cybersecurity
#
websecurity
16
reactions
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account