DEV Community

# authorization

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Implementation of Authorization Middleware with NestJS

Implementation of Authorization Middleware with NestJS

1
Comments
2 min read
🚀 API authorization in API Maker

🚀 API authorization in API Maker

15
Comments
5 min read
Authentication and Authorization

Authentication and Authorization

10
Comments
1 min read
Understanding JWKS (JSON Web Key Set)

Understanding JWKS (JSON Web Key Set)

1
Comments
3 min read
ZenStack: The Complete Authorization Solution for Prisma Projects

ZenStack: The Complete Authorization Solution for Prisma Projects

26
Comments 2
8 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part X: AVP-CLI

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part X: AVP-CLI

7
Comments
6 min read
Navigating the Digital Restaurant: A Taste of Authentication and Authorization in JavaScript

Navigating the Digital Restaurant: A Taste of Authentication and Authorization in JavaScript

16
Comments
3 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part IX: Hierarchies and ABAC

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part IX: Hierarchies and ABAC

9
Comments
5 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VIII: Integration with Cognito

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VIII: Integration with Cognito

5
Comments 4
7 min read
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VII: Audit and Pricing

Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part VII: Audit and Pricing

Comments
5 min read
BoxyHQ + Cerbos: Merging SSO and Authorization

BoxyHQ + Cerbos: Merging SSO and Authorization

1
Comments
10 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part VI - Policy Templates

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part VI - Policy Templates

8
Comments
5 min read
Why Google Zanzibar Shines at Building Authorization

Why Google Zanzibar Shines at Building Authorization

16
Comments
7 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

62
Comments 3
4 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part V - Test Bench

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part V - Test Bench

1
Comments
6 min read
Simplifying Authentication in Next.js Applications with Clerk

Simplifying Authentication in Next.js Applications with Clerk

4
Comments 3
5 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part IV - Schema

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part IV - Schema

2
Comments
6 min read
Send SMS Directly from the Browser (No Backend Code Required!)

Send SMS Directly from the Browser (No Backend Code Required!)

Comments
10 min read
Use OPA for Application-Level Authorization, from RBAC to ABAC in Scale

Use OPA for Application-Level Authorization, from RBAC to ABAC in Scale

5
Comments
3 min read
Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part III

Authorization and Amazon Verified Permissions: A New Way to Manage Permissions - Part III

4
Comments
8 min read
Authorization and Cedar: A New Way to Manage Permissions - Part II

Authorization and Cedar: A New Way to Manage Permissions - Part II

6
Comments
5 min read
Authorization and Cedar: A New Way to Manage Permissions - Part I

Authorization and Cedar: A New Way to Manage Permissions - Part I

13
Comments 1
7 min read
Multiple authorization handlers for the same requirement in ASP.NET Core

Multiple authorization handlers for the same requirement in ASP.NET Core

Comments
5 min read
Multi-tenancy authentication done right

Multi-tenancy authentication done right

3
Comments
8 min read
Programmatically evaluating policies in ASP.NET Core

Programmatically evaluating policies in ASP.NET Core

Comments
3 min read
Authorization in .net Core

Authorization in .net Core

2
Comments
6 min read
Protect your GraphQL data with resource_policy

Protect your GraphQL data with resource_policy

1
Comments
6 min read
OAuth 2.0 authorization with desktop application

OAuth 2.0 authorization with desktop application

Comments
7 min read
Attribute level permission control in Rails

Attribute level permission control in Rails

1
Comments
5 min read
Role-based access control using FastApi

Role-based access control using FastApi

16
Comments 1
2 min read
Default to Deny for More Secure Apps

Default to Deny for More Secure Apps

2
Comments
3 min read
How I created a directive in Angular that renders components only if user is authorized?

How I created a directive in Angular that renders components only if user is authorized?

4
Comments
3 min read
Flow ของ OAuth 2.0

Flow ของ OAuth 2.0

1
Comments
2 min read
Deep linking with Azure Static Web Apps and Easy Auth

Deep linking with Azure Static Web Apps and Easy Auth

1
Comments
5 min read
Azure AD Claims with Static Web Apps and Azure Functions

Azure AD Claims with Static Web Apps and Azure Functions

2
Comments
10 min read
Deep linking with Azure Static Web Apps and Easy Auth

Deep linking with Azure Static Web Apps and Easy Auth

4
Comments
5 min read
Refresh Token Rotation: What, Why and How?

Refresh Token Rotation: What, Why and How?

9
Comments
5 min read
Auth0 Pricing: The Complete Guide [2022]

Auth0 Pricing: The Complete Guide [2022]

5
Comments
4 min read
What is Roles-Based Access Control (RBAC)?

What is Roles-Based Access Control (RBAC)?

3
Comments
3 min read
Encryption, Authentication, and Authorization in Ruby on Rails

Encryption, Authentication, and Authorization in Ruby on Rails

2
Comments
8 min read
Your Auth Cheat Sheet

Your Auth Cheat Sheet

Comments
4 min read
The four mistakes you make building permissions

The four mistakes you make building permissions

23
Comments
9 min read
5 Ways to Improve your AWS IAM Roles and Policies

5 Ways to Improve your AWS IAM Roles and Policies

6
Comments
11 min read
The flexible way to adopt UX/UI in Angular app according to user’s permissions.

The flexible way to adopt UX/UI in Angular app according to user’s permissions.

7
Comments
6 min read
How to Implement Multitenancy in Cloud Computing

How to Implement Multitenancy in Cloud Computing

12
Comments
3 min read
Distributing API Authorization Policies using OPA Bundles

Distributing API Authorization Policies using OPA Bundles

3
Comments
3 min read
OAuth 2.0 & OpenID Connect

OAuth 2.0 & OpenID Connect

8
Comments
2 min read
The Complete List of OAuth 2 Grants

The Complete List of OAuth 2 Grants

8
Comments
2 min read
GitHub’s inconsistent access control

GitHub’s inconsistent access control

5
Comments
4 min read
OPAL + OPA VS XACML

OPAL + OPA VS XACML

6
Comments
7 min read
Revoking Access with a JWT Blacklist/Deny List

Revoking Access with a JWT Blacklist/Deny List

5
Comments
8 min read
Real-time dynamic authorization - an introduction to OPAL

Real-time dynamic authorization - an introduction to OPAL

4
Comments
6 min read
Authentication vs Authorization: What’s the Difference?

Authentication vs Authorization: What’s the Difference?

7
Comments
4 min read
Step-up authorization

Step-up authorization

13
Comments
6 min read
Load external data into OPA: The Good, The Bad, and The Ugly

Load external data into OPA: The Good, The Bad, and The Ugly

13
Comments
10 min read
Designing an Authorization Model for an Enterprise

Designing an Authorization Model for an Enterprise

6
Comments 1
9 min read
Understanding Context-Aware Permissions

Understanding Context-Aware Permissions

4
Comments
7 min read
An Introduction to OPA

An Introduction to OPA

6
Comments 1
7 min read
Authentication — the bare minimum

Authentication — the bare minimum

6
Comments
2 min read
Isomorphic authentication / authorization

Isomorphic authentication / authorization

8
Comments
10 min read
loading...