Articles by Tag #authentication

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Convex & Kinde

This guide outlines the Kinde-specific setup for Convex, following a flow similar to the Convex &...

Learn More 108 0Dec 25 '24

Node.js Authentication: Best Practices and Key Strategies

This article showcases secure login strategies for Node.js, implementing multiple security techniques...

Learn More 40 6Nov 11 '24

Understanding Upwork's Security Systems: A Deep Technical Dive

1. Behavioral Analysis a) Account Activity Patterns Login times and frequency...

Learn More 33 5Nov 22 '24

🌟Implementing OpenID Connect with OpenIddict

Recently, I had the opportunity to work with OpenIddict for implementing OpenID Connect. It can be...

Learn More 26 0Jul 3 '24

What is SCIM Provisioning: In-Depth Guide [2024]

The ability to outsource and automate repetitive daily tasks is at the core of why SCIM provisioning...

Learn More 24 1Oct 29 '24

Authentication with Clerk in NestJS Server Application

Introduction This article provides a comprehensive, step-by-step guide to implementing...

Learn More 22 3Jan 4

Implementing Microsoft Entra Certificate-Based Authentication with Playwright

Use Playwright with sites secured with Microsoft Entra and certificate-based authentication (CBA). Follow this guide for step-by-step instructions and code examples to set up passwordless, phishing-resistant authentication.

Learn More 18 0Sep 18 '24

The Ultimate Guide to Understanding Web Application Authentication

Web application authentication is a critical component of web security, ensuring that only authorized...

Learn More 18 0Oct 9 '24

How to Configure SSH for GitHub Authentication on Linux

Step-by-step guide to setting up SSH authentication for GitHub on Linux, including key generation, adding to the SSH agent, and persisting the key across sessions.

Learn More 17 1Jan 16

API Gateway Authorizers: Vulnerable By Design (be careful!)

I had the benefit of joining the AWS Community Day in Zürich this week, most went as expected but,...

Learn More 16 1May 23

How to Implement Two-Factor Authentication (2FA) in Golang

Authentication is crucial for ensuring security and passwords alone are no longer sufficient to...

Learn More 16 0Jul 1 '24

Using GitHub as an Authentication Provider in Your Angular App with PocketBase

Authentication is always a delicate subject since it is one of the core layers guarding your...

Learn More 15 1Aug 19 '24

Docusaurus authentication with Entra ID and MSAL

Introduction Docusaurus (https://docusaurus.io) is a well-regarded open-source tool for...

Learn More 14 2Oct 2 '24

No Matching Passkeys Available: Troubleshooting Your Login Issue

As more platforms adopt passkeys, the login process is becoming more secure and convenient. However,...

Learn More 14 0Oct 7 '24

Email and Password auth using Better_Auth, nextjs, prisma, shadcn and tailwindcss

In this blog post, we'll explore how to set up email and password authentication in a modern web...

Learn More 13 3Nov 26 '24

How to Implement API Key Authentication in .NET 8

What is API Key Authentication in .NET 8? Imagine you’ve developed a weather dashboard...

Learn More 11 0Aug 3 '24

How to Generate and Verify OTPs in Next.js

When building modern web applications, One-Time Passwords (OTPs) are critical in two-factor...

Learn More 11 0Oct 24 '24

Create a Simple Authentication System for your Next Application with Clerk

Authentication is a process through which users verify their identity before accessing a system. In...

Learn More 11 0Oct 26 '24

The Risks of User Impersonation

What is user impersonation? User impersonation is anything that allows your systems to...

Learn More 11 0Jan 24

AWS Multi-Session Support: Seamlessly Switch Between Accounts

AWS introduces multi-session support in the AWS Management Console, allowing users to sign in to multiple accounts simultaneously within a single browser.

Learn More 10 0Jan 16

Clerk vs Auth0: Choosing the Right Authentication Solution

When building a modern web application, robust and user-friendly authentication is crucial. Choosing...

Learn More 10 1Apr 15

Building an Attendance System Powered by Face Recognition Using React and FACEIO

Quer você esteja gerenciando uma equipe remotamente ou ensinando um grupo de alunos, ter um sistema...

Learn More 8 0Jan 7

Best Authentication Libraries for Next.js in 2025 🔐

Adding authentication to your Next.js app is easier than ever — but picking the right tool depends...

Learn More 8 0Apr 14

Comprehensive Guide to SvelteKitAuth: Secure Authentication for SvelteKit Apps

I've been working on an exciting series about authentication in SvelteKit using SvelteKitAuth. This...

Learn More 8 0Jul 14 '24

Understanding Authentication & Authorization (JWT, OAuth2.0, Session) Concepts

In this blog, I've shared my understanding on different Auth strategies. What is...

Learn More 8 0Apr 3

Pushed Authorization Requests in .NET 9: Why and How to Use Them

You may have heard that .NET 9.0 brings Pushed Authorization Requests (PAR) support in ASP.NET Core....

Learn More 7 0Jan 15

OAuth using Better_Auth, nextjs, prisma, shadcn and tailwindcss

In this blog post, we'll explore how to set up OAuth authentication in a modern web application using...

Learn More 7 0Nov 25 '24

Implementing One-Time Token Authentication with Spring Security

In today's digital landscape, providing secure and user-friendly authentication methods is crucial....

Learn More 6 0Nov 18 '24

Passkeys / WebAuthn Library v2.0 is there! 🎉

Hello folks, I'm pleased to announce the release of the v2.0 of my WebAuthn library! This library...

Learn More 6 6Aug 13 '24

Authentication and Authorization Techniques in Modern Web Applications

As the web grows more complex, securing applications has become paramount. Two critical pillars of...

Learn More 6 0Oct 28 '24