Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
authorization
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Cerbos:-> Authorization-as-a-Service
Dharm Joshi
Dharm Joshi
Dharm Joshi
Follow
Dec 14
Cerbos:-> Authorization-as-a-Service
#
webdev
#
authorization
#
security
#
opensource
Comments
Add Comment
5 min read
10 reasons why you should choose Cerbos as your application's authorization provider
Terrence Aluda
Terrence Aluda
Terrence Aluda
Follow
Dec 15
10 reasons why you should choose Cerbos as your application's authorization provider
#
security
#
saas
#
authorization
#
cerbos
2
 reactions
Comments
Add Comment
6 min read
Simplifying System Design: Authentication vs Authorization
Nishant Naithani
Nishant Naithani
Nishant Naithani
Follow
Dec 12
Simplifying System Design: Authentication vs Authorization
#
systemdesign
#
authentication
#
authorization
#
learning
8
 reactions
Comments
Add Comment
2 min read
How to Set Up Authorization in a Bookstore Management System with Go, HTMX, and Permit.io
Oyedele Temitope
Oyedele Temitope
Oyedele Temitope
Follow
Nov 29
How to Set Up Authorization in a Bookstore Management System with Go, HTMX, and Permit.io
#
authorization
#
htmx
#
go
#
webdev
117
 reactions
Comments
Add Comment
20 min read
Implementing Authorization in a ExpressJS API with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
Implementing Authorization in a ExpressJS API with AuthAction
#
express
#
api
#
authorization
#
authaction
Comments
Add Comment
3 min read
How I'm Learning SpiceDB
Sohan
Sohan
Sohan
Follow
Nov 12
How I'm Learning SpiceDB
#
authorization
#
security
#
iam
#
permissions
9
 reactions
Comments
Add Comment
4 min read
Authorization needs to be dynamic, declarative, and decoupled
Dan
Dan
Dan
Follow
for
Cerbos
Nov 12
Authorization needs to be dynamic, declarative, and decoupled
#
authorization
#
authz
#
microservices
7
 reactions
Comments
Add Comment
5 min read
Custom Role-Based Access Control in NestJS Using Custom Guards
Mofajjal Rasul
Mofajjal Rasul
Mofajjal Rasul
Follow
Nov 11
Custom Role-Based Access Control in NestJS Using Custom Guards
#
nestjs
#
rbac
#
authorization
#
security
1
 reaction
Comments
Add Comment
3 min read
New tools for effortless policy creation and testing in Cerbos Hub
Anna
Anna
Anna
Follow
Oct 9
New tools for effortless policy creation and testing in Cerbos Hub
#
authorization
#
security
#
softwareengineering
#
microservices
Comments
Add Comment
3 min read
Cerbos Review: A Developer's Perspective on Modern Access Control
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 19
Cerbos Review: A Developer's Perspective on Modern Access Control
#
cerbos
#
authorization
#
opensource
19
 reactions
Comments
1
 comment
5 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
akhil mittal
akhil mittal
akhil mittal
Follow
Oct 14
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
#
authentication
#
oauth
#
authorization
#
eks
1
 reaction
Comments
Add Comment
5 min read
Custom Role-Based Authorization with JWT in ASP.NET Core
Mofajjal Rasul
Mofajjal Rasul
Mofajjal Rasul
Follow
Nov 3
Custom Role-Based Authorization with JWT in ASP.NET Core
#
dotnet
#
aspnetcore
#
jwt
#
authorization
1
 reaction
Comments
Add Comment
3 min read
Implementing Authorization in a NestJS API with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
Implementing Authorization in a NestJS API with AuthAction
#
nextjs
#
authorization
#
api
#
authaction
Comments
Add Comment
3 min read
OAuth2 Grant Types Explained: Which One Should You Use?
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31
OAuth2 Grant Types Explained: Which One Should You Use?
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 for Microservices Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31
Implementing OAuth2 for Microservices Authentication
#
api
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
#
security
#
spring
#
authentication
#
authorization
Comments
Add Comment
5 min read
OAuth2: An In-Depth Overview and How It Works
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: An In-Depth Overview and How It Works
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
#
security
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
3 min read
OAuth2: Understanding the Client Credentials Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: Understanding the Client Credentials Grant Type
#
security
#
authentication
#
authorization
#
clientcredentials
1
 reaction
Comments
Add Comment
2 min read
OAuth2: Understanding the Authorization Code Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: Understanding the Authorization Code Grant Type
#
security
#
authentication
#
authorization
#
authorizationcode
Comments
Add Comment
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2 Demystified: An Introduction to Secure Authorization
#
security
#
sauthentication
#
authorization
#
oauth2
Comments
Add Comment
3 min read
Understanding the Differences Between Authentication and Authorization
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Understanding the Differences Between Authentication and Authorization
#
security
#
sauthentication
#
authorization
Comments
Add Comment
2 min read
Passkeys, Are passwords obsolete now?!
Atharva_404
Atharva_404
Atharva_404
Follow
Oct 14
Passkeys, Are passwords obsolete now?!
#
passkeys
#
passwords
#
authenticaion
#
authorization
4
 reactions
Comments
1
 comment
4 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 10
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications
#
authentication
#
authorization
#
security
2
 reactions
Comments
1
 comment
5 min read
Integrating CASL with React for Robust Authorization
Shili Mrawen
Shili Mrawen
Shili Mrawen
Follow
Sep 3
Integrating CASL with React for Robust Authorization
#
casl
#
authorization
#
javascript
#
react
1
 reaction
Comments
Add Comment
2 min read
Setting Up Keycloak as an OAuth Server
Samuel Mutemi
Samuel Mutemi
Samuel Mutemi
Follow
Aug 28
Setting Up Keycloak as an OAuth Server
#
keycloak
#
authorization
#
oauth
#
opensource
Comments
Add Comment
3 min read
Understanding Authentication and Authorization in Microservices
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Follow
Sep 26
Understanding Authentication and Authorization in Microservices
#
authentication
#
authorization
#
microservices
2
 reactions
Comments
Add Comment
5 min read
Authentication and authorization in Node.js applications
Dan
Dan
Dan
Follow
for
Cerbos
Oct 8
Authentication and authorization in Node.js applications
#
authorization
#
node
#
tutorial
#
express
24
 reactions
Comments
6
 comments
10 min read
Authentication and Authorization: Best Practices for Securing Web Applications
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Sep 15
Authentication and Authorization: Best Practices for Securing Web Applications
#
authorization
#
authentication
#
cybersecurity
#
developertips
2
 reactions
Comments
Add Comment
4 min read
Protecting Democracy Through Fine-Grained Authorization
Daniel Bass
Daniel Bass
Daniel Bass
Follow
for
Permit.io
Aug 22
Protecting Democracy Through Fine-Grained Authorization
#
fga
#
authorization
#
programming
#
security
29
 reactions
Comments
1
 comment
4 min read
How to implement authorization in a React application
Anna
Anna
Anna
Follow
Sep 6
How to implement authorization in a React application
#
react
#
authorization
#
cerbos
Comments
Add Comment
3 min read
Authorization in Nestjs API using Auth0 - Step by Step #Series Part-1
tkssharma
tkssharma
tkssharma
Follow
Sep 6
Authorization in Nestjs API using Auth0 - Step by Step #Series Part-1
#
nestjs
#
authorization
#
microservices
#
node
8
 reactions
Comments
Add Comment
2 min read
We Are Developers World Congress; an Engineer's Travelogue
Dan
Dan
Dan
Follow
for
Cerbos
Aug 7
We Are Developers World Congress; an Engineer's Travelogue
#
conference
#
humour
#
authorization
1
 reaction
Comments
Add Comment
8 min read
Add an authorization layer to your app with Permit.io🔏 in a few minutes ⏱️
Rohan Sharma
Rohan Sharma
Rohan Sharma
Follow
Sep 3
Add an authorization layer to your app with Permit.io🔏 in a few minutes ⏱️
#
node
#
javascript
#
authorization
#
tutorial
57
 reactions
Comments
11
 comments
6 min read
Identity 101: Authentication and Authorization
Joe Chen
Joe Chen
Joe Chen
Follow
Sep 4
Identity 101: Authentication and Authorization
#
authentication
#
authorization
1
 reaction
Comments
Add Comment
7 min read
PBAC vs. Zanzibar For User Authorization
Anna
Anna
Anna
Follow
Sep 4
PBAC vs. Zanzibar For User Authorization
#
authorization
#
zanzibar
#
learning
#
backend
1
 reaction
Comments
Add Comment
3 min read
Unveiling the Future of Authorization with Cerbos
Anna
Anna
Anna
Follow
Aug 30
Unveiling the Future of Authorization with Cerbos
#
authorization
#
security
#
softwareengineering
#
podcast
Comments
1
 comment
3 min read
The Relationship Between Access Control, Authorization, and Authentication
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Aug 23
The Relationship Between Access Control, Authorization, and Authentication
#
accesscontrol
#
authorization
#
authentication
1
 reaction
Comments
Add Comment
8 min read
Running Keycloak on Docker for the First Time
Samuel Mutemi
Samuel Mutemi
Samuel Mutemi
Follow
Aug 19
Running Keycloak on Docker for the First Time
#
authentication
#
authorization
#
docker
#
microservices
4
 reactions
Comments
Add Comment
3 min read
🛡️ Authentication vs Authorization: Every Developer Needs to Know 🛡️
Sachin Gadekar
Sachin Gadekar
Sachin Gadekar
Follow
Aug 3
🛡️ Authentication vs Authorization: Every Developer Needs to Know 🛡️
#
authentication
#
authorization
#
javascript
#
webdev
4
 reactions
Comments
Add Comment
2 min read
Introduction to RBAC in Kubernetes
Dan
Dan
Dan
Follow
for
Cerbos
Jul 30
Introduction to RBAC in Kubernetes
#
kubernetes
#
rbac
#
authorization
#
authz
19
 reactions
Comments
2
 comments
5 min read
Building Secure Private Screens in React
Dalu46
Dalu46
Dalu46
Follow
Jul 25
Building Secure Private Screens in React
#
react
#
authorization
#
permissions
#
privacy
2
 reactions
Comments
Add Comment
10 min read
How To Build Centralized Authorization System
Ege Aytin
Ege Aytin
Ege Aytin
Follow
for
Permify
Jul 24
How To Build Centralized Authorization System
#
tutorial
#
authorization
#
microservices
15
 reactions
Comments
Add Comment
10 min read
Security-charging Your NextJS 14 App with Userfront Authentication
Userfront Devs
Userfront Devs
Userfront Devs
Follow
for
Userfront
Jul 24
Security-charging Your NextJS 14 App with Userfront Authentication
#
nextjs
#
authorization
#
security
#
webdev
1
 reaction
Comments
Add Comment
8 min read
Authentication and Authorization in .NET Core
Jemin Desai
Jemin Desai
Jemin Desai
Follow
Jul 12
Authentication and Authorization in .NET Core
#
authentication
#
authorization
#
dotnetcore
#
positiwise
2
 reactions
Comments
Add Comment
5 min read
Automating User Management with Bash Scripting
Mobi
Mobi
Mobi
Follow
Jul 5
Automating User Management with Bash Scripting
#
bash
#
linux
#
authorization
Comments
Add Comment
10 min read
Simplifying Authentication and Authorization with Keycloak
Zorian
Zorian
Zorian
Follow
Jul 3
Simplifying Authentication and Authorization with Keycloak
#
keycloak
#
authorization
#
authentication
#
softwaredevelopment
2
 reactions
Comments
Add Comment
2 min read
Automating User Management and Permissions on Linux using Bash Scripting
Osinachi Chukwujama
Osinachi Chukwujama
Osinachi Chukwujama
Follow
Jul 2
Automating User Management and Permissions on Linux using Bash Scripting
#
linux
#
authorization
4
 reactions
Comments
Add Comment
8 min read
How Discord Built `Access!` - An Authorization Management Portal
Daniel Bass
Daniel Bass
Daniel Bass
Follow
for
Permit.io
Jun 18
How Discord Built `Access!` - An Authorization Management Portal
#
authorization
#
iam
#
discord
#
webdev
13
 reactions
Comments
Add Comment
8 min read
Low-Code Backend Solution for Refine.dev Using Prisma and ZenStack
ymc9
ymc9
ymc9
Follow
for
ZenStack
May 27
Low-Code Backend Solution for Refine.dev Using Prisma and ZenStack
#
webdev
#
react
#
lowcode
#
authorization
20
 reactions
Comments
Add Comment
8 min read
Understanding the Difference Between Authentication and Authorization
Robin-Manuel Thiel
Robin-Manuel Thiel
Robin-Manuel Thiel
Follow
for
Space Blocks
May 9
Understanding the Difference Between Authentication and Authorization
#
authorization
#
authentication
#
permissions
Comments
Add Comment
3 min read
Google Zanzibar implementations
Robin-Manuel Thiel
Robin-Manuel Thiel
Robin-Manuel Thiel
Follow
for
Space Blocks
May 8
Google Zanzibar implementations
#
permissions
#
authorization
#
google
#
zanzibar
2
 reactions
Comments
Add Comment
2 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XV: AVP with Cognito groups
Daniel Aniszkiewicz
Daniel Aniszkiewicz
Daniel Aniszkiewicz
Follow
for
AWS Heroes
Apr 27
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XV: AVP with Cognito groups
#
aws
#
avp
#
authorization
#
cognito
3
 reactions
Comments
Add Comment
10 min read
Docker container | Resolving "Permission Denied" Woes: A Decade-Long Struggle Unraveled
RAHUL DHOLE
RAHUL DHOLE
RAHUL DHOLE
Follow
Apr 26
Docker container | Resolving "Permission Denied" Woes: A Decade-Long Struggle Unraveled
#
docker
#
authorization
#
linux
#
errors
Comments
Add Comment
2 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XIV: AVP Getting Started
Daniel Aniszkiewicz
Daniel Aniszkiewicz
Daniel Aniszkiewicz
Follow
for
AWS Heroes
Apr 23
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XIV: AVP Getting Started
#
aws
#
avp
#
authorization
#
cognito
6
 reactions
Comments
Add Comment
9 min read
Introduction to Authentication and Authorization
Dilanka Rathnasiri
Dilanka Rathnasiri
Dilanka Rathnasiri
Follow
Apr 5
Introduction to Authentication and Authorization
#
beginners
#
authentication
#
authorization
Comments
Add Comment
2 min read
What is an authorization API?
Rohit Ghumare
Rohit Ghumare
Rohit Ghumare
Follow
for
Cerbos
Mar 27
What is an authorization API?
#
security
#
api
#
webdev
#
authorization
Comments
Add Comment
6 min read
Basic Authentication and Authorization
Vinayak Savale
Vinayak Savale
Vinayak Savale
Follow
Mar 20
Basic Authentication and Authorization
#
authentication
#
authorization
#
dotnet
Comments
Add Comment
2 min read
OAuth 2.0 implementation in Node.js
Ege Aytin
Ege Aytin
Ege Aytin
Follow
for
Permify
Mar 13
OAuth 2.0 implementation in Node.js
#
javascript
#
node
#
tutorial
#
authorization
18
 reactions
Comments
Add Comment
11 min read
Photogram Authorization
Mary Webby
Mary Webby
Mary Webby
Follow
Mar 11
Photogram Authorization
#
webdev
#
ruby
#
rails
#
authorization
Comments
Add Comment
4 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account