Articles by Tag #authorization

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Microservices Authentication & Authorization: A Beginner's Guide

Hello there! If you've ever felt overwhelmed by the idea of securing a microservices architecture,...

Learn More 2 0Nov 26 '25

Rule of Two Piece

The Weakest Security Link: The AI Agent AI agents have quickly spread across applications...

Learn More 0 1Dec 24 '25

Practical MCP-Style Authorization: An Experimental PoC and Guide

Practical MCP-Style Authorization: An Experimental PoC and Guide A pragmatic, hands-on...

Learn More 0 0Dec 24 '25

API Security : Understand in 3 Minutes

Problem Statement API Security is the practice of protecting your application's...

Learn More 0 0Dec 11 '25

RBAC in Kubernetes: Understanding Roles, and RoleBindings 🔐

Kubernetes is a powerful platform for managing containerized applications, but with great power comes...

Learn More 0 0Oct 1 '25

When to Use Gates, Policies, and the Spatie Permission Package in Laravel

“Good code is its own best documentation.” — Steve McConnell Key Takeaways Learn what...

Learn More 24 0Jul 10 '25

The Risks of User Impersonation

What is user impersonation? User impersonation is anything that allows your systems to...

Learn More 11 0Jan 24 '25

Authentication and Authorization Best Practices in ASP.NET Core

Authentication and authorization are two pillars of application security. Authentication verifies the...

Learn More 3 0Mar 25 '25

Filament Passport UI – Managing Laravel Passport OAuth with Clarity

Laravel Passport provides a solid, standards-compliant OAuth2 implementation. What it intentionally...

Learn More 0 0Jan 7

How to Protect Your API with OpenFGA: From ReBAC Concepts to Practical Usage

Learn how to implement complex authorization patterns using OpenFGA and Relation-Based Access Control (ReBAC) through a practical example of a cat sitting app.

Learn More 5 2Jun 15 '25

Privileged: A Powerful Authorization Library for .NET

Privileged, a .NET authorization library that makes implementing rule-based permissions both simple...

Learn More 0 0Sep 5 '25

Laravel Passport Authorization Core – A Domain-Oriented Authorization Foundation

n many Laravel applications, OAuth is handled correctly, but authorization modeling slowly degrades...

Learn More 0 0Jan 7

Understanding Authentication & Authorization (JWT, OAuth2.0, Session) Concepts

In this blog, I've shared my understanding on different Auth strategies. What is...

Learn More 6 0Apr 3 '25

Understanding Zanzibar: Google's consistent authorization system

Ever wondered how Google handles millions of authorization (AuthZ) queries per second involving...

Learn More 1 0Jan 26 '25

Scrapebase + Permit.io: Web Scraping with API-First Authorization

Building a web scraping service with tiered access controls using Permit.io for authorization management

Learn More 16 1May 5 '25

The deceptive simplicity of auth

Authn ≠ Authz. Using the generic term 'auth' leads to critical security flaws. This post is a technical breakdown of authentication (identity) vs. authorization (permissions) and explores the build-vs-buy dilemma for your auth stack.

Learn More 2 0Aug 19 '25

Safeguarding Your Data When Using DeepSeek R1 In RAG Pipelines - Part 1

DeepSeek is the talk of the tech world right now, and rightfully so! If you're implementing the...

Learn More 8 0Jan 31 '25

What's the Difference Between Authentication and Authorization?

In the world of cybersecurity and web application management, two concepts are often mentioned...

Learn More 5 0Jul 29 '25

Beware of the New Enemy Problem ⚠️

Google Zanzibar is a globally distributed authorization system capable of processing "more than 10...

Learn More 1 0Mar 6 '25

The interplay of authentication and authorization in ASP.NET Core

While Microsoft continues to improve its authentication and authorization documentation, I believe...

Learn More 0 0Apr 9 '25

Access Token v/s Refresh Token

🔐 What is an Access Token? Purpose: It’s the short-lived credential you present to access protected...

Learn More 0 0Jun 20 '25

Authorization in Node.js, all you need to know

In simple terms, Authorization is a critical component of application security which involves...

Learn More 0 0Mar 6 '25

How to Implement Role-Based Access Control (RBAC) in Node.js Applications

Role-Based Access Control (RBAC) is a widely used method for managing permissions in modern...

Learn More 0 0Feb 27 '25

Introducing Guantr: A Type-Safe Authorization Library for JavaScript/TypeScript

Flexible, type-safe JavaScript library for efficient authorization and permission checking. Easily manage permissions, and context-aware access control with minimal overhead and a simple API.

Learn More 0 0Apr 9 '25

Deploy Permit.IO PDP To Heroku Under 5 Mins! [Video Included]

🚀 Deploying Permit.io PDP to Heroku Let’s deploy your Permit.io Policy Decision Point...

Learn More 0 0May 1 '25

Ever felt like your authorization code could be easier to maintain and more flexible? How confident are you that only authorized users can access your API? When in doubt, have a look at OpenFGA! 👇

How to Protect Your API with OpenFGA:...

Learn More 0 0Jun 18 '25

Safeguarding Your Data When Using DeepSeek R1 In RAG Pipelines - Part II

In Part I we learnt about why we should secure our RAG pipelines with Fine Grained Authorization, and...

Learn More 1 1Jan 31 '25

Implementing OAuth for MCP servers: a developer's guide

Imagine you've built an AI-driven sales analytics tool used by enterprise SaaS businesses. It...

Learn More 0 0Jul 29 '25

Tigris's object store's authentication & authorization

Tigris being S3 compatible, offers S3-supported authentication and authorization methods. AWS S3...

Learn More 0 0Jun 4 '25

Authentication vs Authorization: Key Practices for Building Secure APIs

If your API security isn’t airtight, your entire operation is a ticking time bomb. Why? Well,...

Learn More 0 0Jan 29 '25