Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
authentication
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Password Composition Policies Are Bad and Here's Why
Emmanuel Isenah
Emmanuel Isenah
Emmanuel Isenah
Follow
Dec 23
Password Composition Policies Are Bad and Here's Why
#
passwords
#
security
#
authentication
Comments
Add Comment
9 min read
How to integrate Passkeys into Enterprise Stacks?
vdelitz
vdelitz
vdelitz
Follow
Dec 12
How to integrate Passkeys into Enterprise Stacks?
#
passkeys
#
authentication
#
enterprise
#
integration
Comments
Add Comment
2 min read
How to build a Passkey Product, a Strategy and Design for it?
vdelitz
vdelitz
vdelitz
Follow
for
Corbado
Dec 11
How to build a Passkey Product, a Strategy and Design for it?
#
passkeys
#
authentication
#
cybersecurity
#
enterprisesolution
Comments
Add Comment
3 min read
Authentication and Authorization: A Tale of Security, Flaws, and Fixes đ´ââ ď¸
akash
akash
akash
Follow
Dec 8
Authentication and Authorization: A Tale of Security, Flaws, and Fixes đ´ââ ď¸
#
javascript
#
node
#
authentication
Comments
Add Comment
4 min read
Using Clerk SSO to access Google Calendar and other service data
Brian Morrison II
Brian Morrison II
Brian Morrison II
Follow
for
Clerk
Dec 11
Using Clerk SSO to access Google Calendar and other service data
#
sso
#
authentication
#
integration
#
clerk
2
 reactions
Comments
Add Comment
4 min read
Initial Planning & Technical Assessment for Passkeys
vdelitz
vdelitz
vdelitz
Follow
Dec 2
Initial Planning & Technical Assessment for Passkeys
#
passkeys
#
authentication
#
mfa
#
assessment
Comments
Add Comment
2 min read
SSO with Firebase Authentication
ShinaBR2
ShinaBR2
ShinaBR2
Follow
Dec 1
SSO with Firebase Authentication
#
sso
#
firebase
#
authentication
Comments
Add Comment
1 min read
Streamline enterprise customer onboarding with SAML and Clerk
Brian Morrison II
Brian Morrison II
Brian Morrison II
Follow
for
Clerk
Nov 26
Streamline enterprise customer onboarding with SAML and Clerk
#
authentication
#
security
#
googlecloud
1
 reaction
Comments
Add Comment
6 min read
Anonymous login using better_auth, nextjs, prisma, shadcn
Daanish2003
Daanish2003
Daanish2003
Follow
Dec 5
Anonymous login using better_auth, nextjs, prisma, shadcn
#
betterauth
#
webdev
#
authentication
#
nextjs
1
 reaction
Comments
Add Comment
5 min read
Ă seguro guardar dados do usuĂĄrio no localStorage?
Breno
Breno
Breno
Follow
Nov 15
Ă seguro guardar dados do usuĂĄrio no localStorage?
#
supabase
#
authentication
#
localstorage
#
javascript
Comments
Add Comment
3 min read
Understanding Authentication: Session-Based vs. Token-Based (and Beyond!)
Usool
Usool
Usool
Follow
Nov 15
Understanding Authentication: Session-Based vs. Token-Based (and Beyond!)
#
webdev
#
react
#
flask
#
authentication
Comments
Add Comment
3 min read
Implementing One-Time Token Authentication with Spring Security
Raviteja Daggupati
Raviteja Daggupati
Raviteja Daggupati
Follow
Nov 18
Implementing One-Time Token Authentication with Spring Security
#
springboot
#
springsecurity
#
java
#
authentication
1
 reaction
Comments
Add Comment
4 min read
How to create authenticated routes with the new Expo SDK 51 using Expo Router
DETL INC
DETL INC
DETL INC
Follow
Nov 14
How to create authenticated routes with the new Expo SDK 51 using Expo Router
#
expo
#
router
#
softwaredevelopment
#
authentication
Comments
Add Comment
6 min read
How spoken.host Simplifies Spotify API Authentication
Dogan
Dogan
Dogan
Follow
Nov 13
How spoken.host Simplifies Spotify API Authentication
#
spotify
#
api
#
accesstoken
#
authentication
Comments
Add Comment
3 min read
Remix Drizzle Auth Template
mmvergara
mmvergara
mmvergara
Follow
Dec 13
Remix Drizzle Auth Template
#
webdev
#
remix
#
drizzle
#
authentication
9
 reactions
Comments
Add Comment
1 min read
Password Managers Explained: The Easiest Way to Stay Secure Online
Wonuola Ogunsanmi
Wonuola Ogunsanmi
Wonuola Ogunsanmi
Follow
Dec 13
Password Managers Explained: The Easiest Way to Stay Secure Online
#
cybersecurity
#
security
#
authentication
#
passwords
7
 reactions
Comments
Add Comment
3 min read
Simplifying System Design: Authentication vs Authorization
Nishant Naithani
Nishant Naithani
Nishant Naithani
Follow
Dec 12
Simplifying System Design: Authentication vs Authorization
#
systemdesign
#
authentication
#
authorization
#
learning
6
 reactions
Comments
Add Comment
2 min read
Mastering SignalR Hub Security with Custom Token Authentication in .NET 8
Jyotirmaya Sahu
Jyotirmaya Sahu
Jyotirmaya Sahu
Follow
Dec 10
Mastering SignalR Hub Security with Custom Token Authentication in .NET 8
#
dotnet
#
authentication
#
signalr
#
webdev
1
 reaction
Comments
Add Comment
3 min read
Magic link authentication using Better_Auth, Next.js, Shadcn, Prisma Resend, Tailwindcss
Daanish2003
Daanish2003
Daanish2003
Follow
Dec 5
Magic link authentication using Better_Auth, Next.js, Shadcn, Prisma Resend, Tailwindcss
#
betterauth
#
webdev
#
nextjs
#
authentication
1
 reaction
Comments
Add Comment
7 min read
Username and Password Authentication with Better_Auth, Next.js, Prisma, Shadcn, and TailwindCSS
Daanish2003
Daanish2003
Daanish2003
Follow
Dec 5
Username and Password Authentication with Better_Auth, Next.js, Prisma, Shadcn, and TailwindCSS
#
betterauth
#
nextjs
#
webdev
#
authentication
7
 reactions
Comments
Add Comment
8 min read
How to Engage with Stakeholders in Passkey Projects?
vdelitz
vdelitz
vdelitz
Follow
for
Corbado
Dec 4
How to Engage with Stakeholders in Passkey Projects?
#
passkeys
#
stakeholder
#
authentication
#
webauthn
Comments
Add Comment
2 min read
TADOConnection: Proper Use of LoginPrompt
Dejan Dozet
Dejan Dozet
Dejan Dozet
Follow
Oct 30
TADOConnection: Proper Use of LoginPrompt
#
delphi
#
authentication
#
bestpractices
#
pascal
Comments
Add Comment
1 min read
đ Benefits and Drawbacks of Passkey-Only Login Systems
sateshcharan
sateshcharan
sateshcharan
Follow
Oct 27
đ Benefits and Drawbacks of Passkey-Only Login Systems
#
passkey
#
hanko
#
authentication
#
credentials
Comments
Add Comment
2 min read
Email and Password auth using Better_Auth, nextjs, prisma, shadcn and tailwindcss
Daanish2003
Daanish2003
Daanish2003
Follow
Nov 26
Email and Password auth using Better_Auth, nextjs, prisma, shadcn and tailwindcss
#
typescript
#
betterauth
#
authentication
#
webdev
2
 reactions
Comments
1
 comment
19 min read
How to Authenticate Your Google Cloud Project Without a Migraine
Cristina Rodriguez
Cristina Rodriguez
Cristina Rodriguez
Follow
Nov 25
How to Authenticate Your Google Cloud Project Without a Migraine
#
googlecloud
#
authentication
#
machinelearning
#
tensorflow
Comments
Add Comment
3 min read
Secure Your App: 2-Factor Auth in 3 Easy Steps
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 22
Secure Your App: 2-Factor Auth in 3 Easy Steps
#
api
#
app
#
authentication
#
business
1
 reaction
Comments
Add Comment
2 min read
OAuth using Better_Auth, nextjs, prisma, shadcn and tailwindcss
Daanish2003
Daanish2003
Daanish2003
Follow
Nov 25
OAuth using Better_Auth, nextjs, prisma, shadcn and tailwindcss
#
typescript
#
betterauth
#
authentication
#
webdev
3
 reactions
Comments
Add Comment
15 min read
React Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
React Oauth2 Integration with AuthAction
#
authaction
#
oauth
#
authentication
#
webdev
Comments
Add Comment
3 min read
Understanding Upwork's Security Systems: A Deep Technical Dive
Jason Smith
Jason Smith
Jason Smith
Follow
Nov 22
Understanding Upwork's Security Systems: A Deep Technical Dive
#
upwork
#
security
#
machinelearning
#
authentication
32
 reactions
Comments
4
 comments
2 min read
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Nov 20
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication
#
webdev
#
firebase
#
developertools
#
authentication
Comments
2
 comments
3 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 16
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
#
wep
#
authentication
#
wifisecurity
#
cybersecurity
Comments
Add Comment
3 min read
Integrando Autenticação JWT no Lithe
Lithe
Lithe
Lithe
Follow
Nov 4
Integrando Autenticação JWT no Lithe
#
php
#
jwt
#
lithe
#
authentication
2
 reactions
Comments
Add Comment
3 min read
Integrating the JWT Middleware in Lithe
Lithe
Lithe
Lithe
Follow
Nov 4
Integrating the JWT Middleware in Lithe
#
authentication
#
php
#
lithe
#
jwt
2
 reactions
Comments
Add Comment
2 min read
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 13
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
#
api
#
authentication
#
it
#
java
Comments
Add Comment
9 min read
ForwardAuth with Traefik: Streamlining Security for Microservices
Tomaz Lovrec
Tomaz Lovrec
Tomaz Lovrec
Follow
Oct 11
ForwardAuth with Traefik: Streamlining Security for Microservices
#
traefik
#
authentication
#
security
#
forwardauth
Comments
Add Comment
6 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database
Mustafa Khaled
Mustafa Khaled
Mustafa Khaled
Follow
Oct 10
Why Hashed OTP Tokens Are Better Than Storing Them in a Database
#
otp
#
security
#
authentication
#
optimization
Comments
Add Comment
3 min read
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 13
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
#
authentication
#
2fa
1
 reaction
Comments
Add Comment
8 min read
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 8
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
#
authentication
#
java
#
programming
#
language
Comments
Add Comment
2 min read
Vuejs Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
Vuejs Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
oauth
#
authaction
Comments
Add Comment
3 min read
Angular Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21
Angular Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
authaction
#
oauth
Comments
Add Comment
3 min read
Database Setup, JWT Implementation & API
Michael M.
Michael M.
Michael M.
Follow
Oct 26
Database Setup, JWT Implementation & API
#
postgres
#
jwt
#
authentication
3
 reactions
Comments
Add Comment
9 min read
Learn about basic Authentication
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Follow
Nov 5
Learn about basic Authentication
#
authentication
#
backenddevelopment
#
security
2
 reactions
Comments
Add Comment
4 min read
Clear illustration of how API Token Authentication works
Daichi Izushi
Daichi Izushi
Daichi Izushi
Follow
Nov 5
Clear illustration of how API Token Authentication works
#
laravel
#
php
#
api
#
authentication
1
 reaction
Comments
Add Comment
7 min read
Node.js Authentication: Best Practices and Key Strategies
Sushant Rahate
Sushant Rahate
Sushant Rahate
Follow
Nov 11
Node.js Authentication: Best Practices and Key Strategies
#
javascript
#
authentication
#
node
#
security
40
 reactions
Comments
6
 comments
6 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
akhil mittal
akhil mittal
akhil mittal
Follow
Oct 14
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
#
authentication
#
oauth
#
authorization
#
eks
1
 reaction
Comments
Add Comment
5 min read
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
dio arafi
dio arafi
dio arafi
Follow
Nov 3
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
#
remix
#
go
#
twilio
#
authentication
2
 reactions
Comments
Add Comment
3 min read
HTTP Basic Auth Explained
Timo Reusch
Timo Reusch
Timo Reusch
Follow
Sep 29
HTTP Basic Auth Explained
#
webdev
#
authentication
Comments
Add Comment
2 min read
OAuth2 Grant Types Explained: Which One Should You Use?
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31
OAuth2 Grant Types Explained: Which One Should You Use?
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 for Microservices Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31
Implementing OAuth2 for Microservices Authentication
#
api
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
#
security
#
spring
#
authentication
#
authorization
Comments
Add Comment
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2 Client Credentials Grant Type: When and How to Use It
#
security
#
authentication
#
clientcredentials
#
oauth2
Comments
Add Comment
4 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide
#
security
#
spring
#
api
#
authentication
Comments
Add Comment
4 min read
OAuth2: An In-Depth Overview and How It Works
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: An In-Depth Overview and How It Works
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Spring Security: Implementing JWT Authentication in Your Java Application
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Spring Security: Implementing JWT Authentication in Your Java Application
#
security
#
spring
#
authentication
#
jwt
Comments
Add Comment
4 min read
Passwordless Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Passwordless Authentication
#
security
#
passwordless
#
authentication
Comments
Add Comment
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
#
security
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
3 min read
OAuth2: Understanding the Client Credentials Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: Understanding the Client Credentials Grant Type
#
security
#
authentication
#
authorization
#
clientcredentials
1
 reaction
Comments
Add Comment
2 min read
OAuth2: Understanding the Authorization Code Grant Type
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30
OAuth2: Understanding the Authorization Code Grant Type
#
security
#
authentication
#
authorization
#
authorizationcode
Comments
Add Comment
3 min read
What is SCIM Provisioning: In-Depth Guide [2024]
Ege Aytin
Ege Aytin
Ege Aytin
Follow
for
Permify
Oct 29
What is SCIM Provisioning: In-Depth Guide [2024]
#
webdev
#
cloud
#
tutorial
#
authentication
23
 reactions
Comments
1
 comment
12 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth
Yu Hamada
Yu Hamada
Yu Hamada
Follow
Oct 29
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth
#
webdev
#
beginners
#
security
#
authentication
Comments
Add Comment
4 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account