Forem

# authentication

User authentication mechanisms

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Authentication with Clerk in Next.js

Implementing Authentication with Clerk in Next.js

6
Comments
3 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy

How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy

2
Comments
5 min read
First post: Openfav-auth, an(other) Astro app template
Cover image for First post: Openfav-auth, an(other) Astro app template

First post: Openfav-auth, an(other) Astro app template

Comments 2
1 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments 1
6 min read
Guide: How to Add Passkeys to Enterprise Systems
Cover image for Guide: How to Add Passkeys to Enterprise Systems

Guide: How to Add Passkeys to Enterprise Systems

1
Comments
3 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

2
Comments
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

3
Comments 1
5 min read
The Ultimate Guide to Understanding Web Application Authentication

The Ultimate Guide to Understanding Web Application Authentication

18
Comments
3 min read
How to use SuperTokens in a VueJS app with your own UI
Cover image for How to use SuperTokens in a VueJS app with your own UI

How to use SuperTokens in a VueJS app with your own UI

5
Comments
9 min read
No Matching Passkeys Available: Troubleshooting Your Login Issue
Cover image for No Matching Passkeys Available: Troubleshooting Your Login Issue

No Matching Passkeys Available: Troubleshooting Your Login Issue

15
Comments
2 min read
Securing Your Website with Basic Auth for NGINX

Securing Your Website with Basic Auth for NGINX

3
Comments
4 min read
Docusaurus authentication with Entra ID and MSAL
Cover image for Docusaurus authentication with Entra ID and MSAL

Docusaurus authentication with Entra ID and MSAL

16
Comments 2
4 min read
Authentication Types: JWT, OAuth, and Secure Integration with Google and Facebook

Authentication Types: JWT, OAuth, and Secure Integration with Google and Facebook

Comments
4 min read
Pentesting AWS Cognito: User Authentication Risks
Cover image for Pentesting AWS Cognito: User Authentication Risks

Pentesting AWS Cognito: User Authentication Risks

Comments
12 min read
Understanding Authentication and Authorization in Microservices

Understanding Authentication and Authorization in Microservices

2
Comments
5 min read
Is it possible to eliminate phishing?

Is it possible to eliminate phishing?

Comments
1 min read
OAuth andOpenID - Introduction

OAuth andOpenID - Introduction

Comments
2 min read
Build a powerful password meter with Cloudflare Workers, Next.js, and zxcvbn.
Cover image for Build a powerful password meter with Cloudflare Workers, Next.js, and zxcvbn.

Build a powerful password meter with Cloudflare Workers, Next.js, and zxcvbn.

1
Comments
6 min read
Mastering Modern Authentication in Web Applications: OAuth 2.0 Demystified

Mastering Modern Authentication in Web Applications: OAuth 2.0 Demystified

5
Comments
11 min read
Implementing Microsoft Entra Certificate-Based Authentication with Playwright

Implementing Microsoft Entra Certificate-Based Authentication with Playwright

19
Comments
3 min read
Authentication Types in Microservices
Cover image for Authentication Types in Microservices

Authentication Types in Microservices

Comments
2 min read
Passkey One-Tap Login: The Most Efficient Login
Cover image for Passkey One-Tap Login: The Most Efficient Login

Passkey One-Tap Login: The Most Efficient Login

Comments
2 min read
Authentication and Authorization: Best Practices for Securing Web Applications
Cover image for Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

3
Comments
4 min read
Practical Applications of RSA Encryption: Beyond Authentication and Digital Signatures

Practical Applications of RSA Encryption: Beyond Authentication and Digital Signatures

Comments
2 min read
A SAML Security Vulnerability Handbook for Developers
Cover image for A SAML Security Vulnerability Handbook for Developers

A SAML Security Vulnerability Handbook for Developers

Comments
10 min read
loading...