DEV Community

# authentication

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
8 Invisible Mistakes That Are Killing Your Email Campaigns in 2025

8 Invisible Mistakes That Are Killing Your Email Campaigns in 2025

Comments
4 min read
How To Implement JWT Authentication In Command-Line Applications

How To Implement JWT Authentication In Command-Line Applications

Comments
3 min read
Express Authentication + RBAC

Express Authentication + RBAC

Comments 1
7 min read
JWT Creation and Integration in InterSystems IRIS

JWT Creation and Integration in InterSystems IRIS

Comments
8 min read
CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!

CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!

Comments
3 min read
A no-BS guide for developers to implement SSO

A no-BS guide for developers to implement SSO

Comments
3 min read
Why the UKโ€™s NCSC Advocates Passkeys Over Passwords for Better Cyber Security

Why the UKโ€™s NCSC Advocates Passkeys Over Passwords for Better Cyber Security

Comments
2 min read
๐Ÿ” Clerk + Next.js: A Developer-Friendly Auth Stack That Gets Out of Your Way

๐Ÿ” Clerk + Next.js: A Developer-Friendly Auth Stack That Gets Out of Your Way

Comments
3 min read
The interplay of authentication and authorization in ASP.NET Core

The interplay of authentication and authorization in ASP.NET Core

Comments
6 min read
๐Ÿ” How to Use Email as the Username in Django (The Right Way)

๐Ÿ” How to Use Email as the Username in Django (The Right Way)

Comments
2 min read
Authentication Methods: Ensuring Safe and Secure Access

Authentication Methods: Ensuring Safe and Secure Access

Comments
3 min read
Polar.sh + BetterAuth for Organizations

Polar.sh + BetterAuth for Organizations

3
Comments
6 min read
Mastering OIDC: A Developer's Guide to Secure Authentication

Mastering OIDC: A Developer's Guide to Secure Authentication

1
Comments
3 min read
How does BCrypt Verification work?

How does BCrypt Verification work?

Comments
4 min read
comment crรฉer une authentification React et api Laravel sanctum

comment crรฉer une authentification React et api Laravel sanctum

Comments
1 min read
OAuth 2.0 Security Best Practices for Developers

OAuth 2.0 Security Best Practices for Developers

2
Comments
11 min read
Demystifying Authentication in Spring Security

Demystifying Authentication in Spring Security

2
Comments
16 min read
Clerk vs Auth0: Choosing the Right Authentication Solution

Clerk vs Auth0: Choosing the Right Authentication Solution

7
Comments 1
6 min read
How Adaptive Authentication Keeps Users Happy Without Compromising Security

How Adaptive Authentication Keeps Users Happy Without Compromising Security

Comments
4 min read
Best Authentication Libraries for Next.js in 2025 ๐Ÿ”

Best Authentication Libraries for Next.js in 2025 ๐Ÿ”

8
Comments
3 min read
Building a Secure Authentication System in MERN Stack: My Experience with JWT, Refresh Tokens, RBAC, and CORS

Building a Secure Authentication System in MERN Stack: My Experience with JWT, Refresh Tokens, RBAC, and CORS

Comments
3 min read
๐Ÿ” ๐—™๐—ถ๐˜…๐—ถ๐—ป๐—ด ๐—Ÿ๐—ผ๐—ด๐—ถ๐—ป ๐—™๐—ฎ๐—ถ๐—น๐˜‚๐—ฟ๐—ฒ ๐—ถ๐—ป ๐—”๐—ฆ๐—ฃ.๐—ก๐—˜๐—ง ๐—–๐—ผ๐—ฟ๐—ฒ ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜†: ๐—” ๐——๐—ฒ๐—ฏ๐˜‚๐—ด๐—ด๐—ถ๐—ป๐—ด ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ

๐Ÿ” ๐—™๐—ถ๐˜…๐—ถ๐—ป๐—ด ๐—Ÿ๐—ผ๐—ด๐—ถ๐—ป ๐—™๐—ฎ๐—ถ๐—น๐˜‚๐—ฟ๐—ฒ ๐—ถ๐—ป ๐—”๐—ฆ๐—ฃ.๐—ก๐—˜๐—ง ๐—–๐—ผ๐—ฟ๐—ฒ ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜†: ๐—” ๐——๐—ฒ๐—ฏ๐˜‚๐—ด๐—ด๐—ถ๐—ป๐—ด ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ

Comments
1 min read
User authentication caching in FastAPI

User authentication caching in FastAPI

Comments 1
4 min read
Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro

Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro

1
Comments
6 min read
Session vs JWT Auth in Express.js: Which Wins?

Session vs JWT Auth in Express.js: Which Wins?

Comments
1 min read
loading...