Articles by Tag #auth

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Wait, are we just handing over system access to the AI agents?

David Fowler recently asked an excellent question that’s been on my mind as well. As the tech...

Learn More 28 5Dec 30 '24

You're thinking about passkeys wrong

It's a godsend for ordinary people but hated by (some) tech folks

Learn More 24 14Jan 29

Auth Made Easy: A Beginner's Guide to Keeping Your Apps Secure

Auth is everywhere these days, and websites are stepping up their security game to stay on the...

Learn More 22 0Feb 11

Efficient Cookie Management with the Cookie Store API

Learn how to use the Cookie Store API for efficient cookie management in web applications.

Learn More 15 5May 13

Laravel 11 API Rest Auth with jwt-auth

Installing via composer composer require tymon/jwt-auth Enter fullscreen mode ...

Learn More 8 0Jul 26 '24

Managing Auth State in react using useContext API

This code snippet is all you need to manage auth state on your react application uses the Context API...

Learn More 8 0Sep 8 '24

Logto reaches 10,000 GitHub stars and 1 million identities: The open foundation for identity in the AI era

We’re deeply grateful to have you on this journey. Join us in celebrating Logto’s milestone achievements!

Learn More 4 1May 12

Secure Your Nuxt 3 App

Authentication is a crucial aspect of any modern web application. Whether you’re building an...

Learn More 3 0Nov 28 '24

Implementing Cookie-Based JWT Authentication in a tRPC Backend

This guide provides a step-by-step tutorial on implementing cookie authentication in your tRPC application, enhancing security and user experience.

Learn More 2 0Jan 16

Build Next.js Auth Pages UI in 10 Minutes with Flexy UI

Build Next.js 15 auth pages in 10 minutes with Flexy UI. A step-by-step guide to creating login, sign-up, and forgot password pages with reusable components.

Learn More 2 0Mar 3

AI agent auth: use cases and identity needs

2025 is the year of AI. As LLMs and agent experiences evolve, new challenges in authentication and authorization emerge. This article explores AI agent interactions, highlighting key security and authentication scenarios.

Learn More 1 1Mar 26

How to add Google OAuth to Next.js App Router with Supabase Auth

A guide to adding Supabase Google auth in Next.js (App Router) including the common pitfalls and how to avoid them

Learn More 1 0Apr 4

How to decode a JWT

JWTs are used a lot in authentication, but have you ever wondered how libraries extract information...

Learn More 1 0Jul 29 '24

Authentication vs Authorization: Understanding the Difference

Securing the Digital World: Authentication vs Authorization In today's digital landscape,...

Learn More 1 0Mar 29

Managing Supabase Auth State Across Server & Client Components in Next.js

This article intends to save you 10+ hours of your valuable time, effort, and ‘developer’ pain, which...

Learn More 1 0May 17

OAuth2.0 Auth Tokens: A Comprehensive Guide

OAuth 2.0 in Real Life: The Netflix Streaming Analogy Imagine you're using Netflix on...

Learn More 1 0Apr 1

How to Authenticate Users Codeigniter Shield

Authentication is the keystone of any secure web application. In the world of PHP frameworks,...

Learn More 1 0Aug 14 '24

Implementing Auth in .NET WebApi & SPAs: Why is it still so painful?

I wanted to reboot a conversation about something that has frustrated me repeatedly over the years:...

Learn More 1 0Dec 12 '24

[Boost]

Efficient Cookie Management with the Cookie Store API ...

Learn More 0 0May 14

Criando o meu Projeto de Portfólio pessoal com Deploy na AWS!

E aí, devs! vou fala um pouco mais sobre o projeto que estou criando que envolve desenvolvimento...

Learn More 0 0Jun 1

Secure Your Next.js App: Email & Google Authentication with Supabase, PostgreSQL RLS, and Triggers - Part 3

Let us see how to enhance our web app's security and user experience by integrating Google...

Learn More 0 0Mar 15

Disposable emails: What they are, Why they exist, and how to handle them in your app

Learn what disposable emails are, why they exist, the risks they pose to applications, and the key strategies you can use to detect and block them for stronger security and cleaner user data.

Learn More 0 0May 6

Create a multi-step form with Tailwind CSS and JavaScript

Let’s build a 4-step multistep form from scratch! Just a quick refresher — a multistep form breaks a...

Learn More 0 0Apr 7

JWT - Based Auth: A Deep Dive

Understanding JWT-Based Security In modern web applications, JSON Web Tokens (JWTs) have...

Learn More 0 0Mar 31

PCI DSS 4.0 Authentication: How Passkeys Transform Payment Security

Read the full article here Introduction As payment threats increase in complexity,...

Learn More 0 0Jun 19