Forem

# authentication

User authentication mechanisms

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Use Cursor AI to design Kinde auth UX
Cover image for Use Cursor AI to design Kinde auth UX

Use Cursor AI to design Kinde auth UX

3
Comments 2
2 min read
🔐 ASP.NET Core Identity vs JWT (Without Identity)

🔐 ASP.NET Core Identity vs JWT (Without Identity)

Comments
2 min read
The deceptive simplicity of auth

The deceptive simplicity of auth

2
Comments
3 min read
Snowflake Organization Users: Centralized Identity for a Multi-Account World

Snowflake Organization Users: Centralized Identity for a Multi-Account World

Comments
5 min read
It Kinde of works: Part 1 of many
Cover image for It Kinde of works: Part 1 of many

It Kinde of works: Part 1 of many

3
Comments 1
2 min read
Understanding Authentication That Actually Makes Sense

Understanding Authentication That Actually Makes Sense

6
Comments 3
3 min read
Access and Refresh Tokens in Token-Based Authentication
Cover image for Access and Refresh Tokens in Token-Based Authentication

Access and Refresh Tokens in Token-Based Authentication

19
Comments 1
6 min read
Future proofing your platform
Cover image for Future proofing your platform

Future proofing your platform

1
Comments
5 min read
💎 ANN: omniauth-identity v3.1.4
Cover image for 💎 ANN: omniauth-identity v3.1.4

💎 ANN: omniauth-identity v3.1.4

6
Comments
1 min read
What is Authentication?

What is Authentication?

Comments
2 min read
Setting Up A Multi-factor Dev Environment For Payment Approvals
Cover image for Setting Up A Multi-factor Dev Environment For Payment Approvals

Setting Up A Multi-factor Dev Environment For Payment Approvals

27
Comments
10 min read
Going Passwordless on epilot 360 with Custom Cognito Triggers

Going Passwordless on epilot 360 with Custom Cognito Triggers

Comments 2
4 min read
Creating a Kinde workflow to check for malicious IPs during authentication
Cover image for Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
How I Implemented Google Authentication: A Step-by-Step Guide

How I Implemented Google Authentication: A Step-by-Step Guide

Comments
4 min read
OpenID: A Comprehensive Guide to Secure Online Authentication
Cover image for OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.