Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
authentication
Follow
Hide
Posts
Left menu
š
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Nov 20 '24
Unlocking Firebase for Web Development: Real-Time Databases, Hosting, and Authentication
#
webdev
#
firebase
#
developertools
#
authentication
Comments
2
comments
3 min read
Implementing One-Time Token Authentication with Spring Security
Raviteja Daggupati
Raviteja Daggupati
Raviteja Daggupati
Follow
Nov 18 '24
Implementing One-Time Token Authentication with Spring Security
#
springboot
#
springsecurity
#
java
#
authentication
6
reactions
Comments
Add Comment
4 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 16 '24
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes
#
wep
#
authentication
#
wifisecurity
#
cybersecurity
Comments
Add Comment
3 min read
Integrando Autenticação JWT no Lithe
Lithe
Lithe
Lithe
Follow
Nov 4 '24
Integrando Autenticação JWT no Lithe
#
php
#
jwt
#
lithe
#
authentication
2
reactions
Comments
Add Comment
3 min read
Integrating the JWT Middleware in Lithe
Lithe
Lithe
Lithe
Follow
Nov 4 '24
Integrating the JWT Middleware in Lithe
#
authentication
#
php
#
lithe
#
jwt
2
reactions
Comments
Add Comment
2 min read
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 13 '24
Secure Your APIs in 5 Minutes: Token-Based RSocket with JWT
#
api
#
authentication
#
it
#
java
Comments
Add Comment
9 min read
ForwardAuth with Traefik: Streamlining Security for Microservices
Tomaz Lovrec
Tomaz Lovrec
Tomaz Lovrec
Follow
Oct 11 '24
ForwardAuth with Traefik: Streamlining Security for Microservices
#
traefik
#
authentication
#
security
#
forwardauth
Comments
Add Comment
6 min read
How to create authenticated routes with the new Expo SDK 51 using Expo Router
DETL INC
DETL INC
DETL INC
Follow
Nov 14 '24
How to create authenticated routes with the new Expo SDK 51 using Expo Router
#
expo
#
router
#
softwaredevelopment
#
authentication
1
reaction
Comments
Add Comment
6 min read
How spoken.host Simplifies Spotify API Authentication
Dogan
Dogan
Dogan
Follow
Nov 13 '24
How spoken.host Simplifies Spotify API Authentication
#
spotify
#
api
#
accesstoken
#
authentication
1
reaction
Comments
Add Comment
3 min read
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Nov 13 '24
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know
#
authentication
#
2fa
1
reaction
Comments
Add Comment
8 min read
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
Jackson Williams
Jackson Williams
Jackson Williams
Follow
Oct 8 '24
Protect Your App in 5 Minutes: OAuth Tokens Made Easy
#
authentication
#
java
#
programming
#
language
Comments
Add Comment
2 min read
Vuejs Oauth2 Integration with AuthAction
AuthAction Developer
AuthAction Developer
AuthAction Developer
Follow
for
AuthAction
Oct 21 '24
Vuejs Oauth2 Integration with AuthAction
#
webdev
#
authentication
#
oauth
#
authaction
Comments
Add Comment
3 min read
Database Setup, JWT Implementation & API
Michael M.
Michael M.
Michael M.
Follow
Oct 26 '24
Database Setup, JWT Implementation & API
#
postgres
#
jwt
#
authentication
3
reactions
Comments
Add Comment
9 min read
Learn about basic Authentication
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Isaac Tonyloi - SWE
Follow
Nov 5 '24
Learn about basic Authentication
#
authentication
#
backenddevelopment
#
security
2
reactions
Comments
Add Comment
4 min read
Clear illustration of how API Token Authentication works
Daichi Izushi
Daichi Izushi
Daichi Izushi
Follow
Nov 5 '24
Clear illustration of how API Token Authentication works
#
laravel
#
php
#
api
#
authentication
1
reaction
Comments
Add Comment
7 min read
Node.js Authentication: Best Practices and Key Strategies
Sushant Rahate
Sushant Rahate
Sushant Rahate
Follow
Nov 11 '24
Node.js Authentication: Best Practices and Key Strategies
#
javascript
#
authentication
#
node
#
security
40
reactions
Comments
6
comments
6 min read
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
akhil mittal
akhil mittal
akhil mittal
Follow
Oct 14 '24
How to Secure Your AWS EKS Application with OAuth 2.0 and SSO Integration Using Amazon Cognito and OAuth2-Proxy
#
authentication
#
oauth
#
authorization
#
eks
1
reaction
Comments
Add Comment
5 min read
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
Jonilss
Jonilss
Jonilss
Follow
Nov 3 '24
Membangun Aplikasi Verifikasi Kode Autentikasi dengan Twilio Menggunakan Go dan Remix
#
remix
#
go
#
twilio
#
authentication
2
reactions
Comments
2
comments
3 min read
OAuth2 Grant Types Explained: Which One Should You Use?
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31 '24
OAuth2 Grant Types Explained: Which One Should You Use?
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 for Microservices Authentication
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 31 '24
Implementing OAuth2 for Microservices Authentication
#
api
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide
#
security
#
spring
#
authentication
#
authorization
Comments
Add Comment
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
OAuth2 Client Credentials Grant Type: When and How to Use It
#
security
#
authentication
#
clientcredentials
#
oauth2
Comments
Add Comment
4 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide
#
security
#
spring
#
api
#
authentication
Comments
Add Comment
4 min read
Spring Security: Implementing JWT Authentication in Your Java Application
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Spring Security: Implementing JWT Authentication in Your Java Application
#
security
#
spring
#
authentication
#
jwt
Comments
Add Comment
4 min read
OAuth2: An In-Depth Overview and How It Works
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
OAuth2: An In-Depth Overview and How It Works
#
authentication
#
authorization
#
oauth2
Comments
Add Comment
4 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account