Articles by Tag #jwt

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

OAuth vs. JWT: Ultimate Comparison

One of the most critical decisions in a software development project is selecting security standards....

Learn More 39 4Jul 25 '24

Securing Microservices with Spring Security: Implementing JWT

JSON WEB TOKEN (JWT) JWT (JSON Web Token) is a method for securely transmitting...

Learn More 39 1Aug 23 '24

JWT Refresh with Axios Interceptors in React

Advanced API Client Configuration with Axios and JWT Refresh Token Handling in React In...

Learn More 38 4Jul 18 '24

🔐 JWT Simplified: How Does It Keep You Logged In?

In today's digital landscape, user authentication is paramount for ensuring security and convenience....

Learn More 27 0Oct 3 '24

Securing Your Go API with JWT Authentication

Alright, let’s get real for a second. Security is a big deal, and if you’re building APIs, you can’t...

Learn More 16 2Oct 3 '24

The Definitive Auth Guide for Backend Developers

Most devs treat authentication like a checkbox - “yep, users log in, done.” Newsflash: that lazy...

Learn More 13 2May 22

Securing Your Fullstack App: Authentication & Authorization with JWT in Next.js and Node 🔒 🚀

Securing your fullstack application is critical to protect user data and maintain trust. One of the...

Learn More 11 1Nov 27 '24

Implementing Email Code Verification in Java Spring Boot

Introduction Email verification is a critical component in many applications, especially during user...

Learn More 11 0Aug 9 '24

flow design for access and refresh token- JWT

let build low-level-design for the same. login the user with credential and validate it...

Learn More 11 1Dec 19 '24

Session, Cookie, JWT, Token, SSO, and OAuth 2.0

Here’s an overview of each authentication and session management mechanism, along with examples: ...

Learn More 11 1Sep 8 '24

Key Concepts to Understand Before Diving into Nylas

Must-Know Concepts Before You Dive into Nylas So, I was ready to get started with Nylas...

Learn More 9 0Aug 12 '24

More Secure JWT | A Better Experience

Hi there DEV.to community! Recently I've read some small posts on my social media that pointed out...

Learn More 8 0Oct 5 '24

A Step by Step Guide to Building Lightning Fast APIs

FastAPI is a Python framework that lets you build APIs with speed and simplicity. It supports async...

Learn More 8 0Feb 14

Securing Your .NET APIs with JWT Authentication

JSON Web Tokens (JWT) are a widely-used standard for securing APIs. In this post, we will explore how...

Learn More 8 1Jan 3

Laravel 11 API Rest Auth with jwt-auth

Installing via composer composer require tymon/jwt-auth Enter fullscreen mode ...

Learn More 8 0Jul 26 '24

DIY JWT Authentication in FastAPI Using Only Python

Leapcell: The Best of Serverless Web Hosting Implementing Authentication with JWT in...

Learn More 6 0Apr 10

JWT Token Refresh: Authentication Made Simple 🔐

Why Do We Need Token Refresh? Imagine you're playing an online game, and every 30 minutes,...

Learn More 6 3Nov 29 '24

Authentication and Authorization Techniques in Modern Web Applications

As the web grows more complex, securing applications has become paramount. Two critical pillars of...

Learn More 6 0Oct 28 '24

JavaScript in the Browser: Understanding and Manipulating the Document Object Model (DOM)

Javascript is one of the core technologies of the World Wide Web, alongside HTML and CSS.It's a...

Learn More 5 0May 16

Database Setup, JWT Implementation & API

Foundation For this series, our launchpad will be two separate applications: the Spring...

Learn More 4 0Oct 26 '24

Private Self-Hosted OIDC AWS Authentication

Often times in order to connect to AWS services from our local machines or external systems, we...

Learn More 4 0Oct 2 '24

Securing Your REST API with JWT Authorizers and Amazon Cognito

Most applications today expose an API to facilitate seamless interaction with their features and...

Learn More 4 1Oct 31 '24

Implementing JWT Authentication in Minimal APIs

In my previous article, I covered validation in Minimal APIs, but security is just as important. Most...

Learn More 4 0Feb 5

Part 1: How to build Auth API in Rust using gRPC

Introduction Welcome to the first part of our comprehensive guide on building an...

Learn More 3 0Sep 4 '24

🔑 JWT Tokens VS Session Cookies in Authentication and Authorization 🍪

First thing first, let's briefly talk about the mechanism of each approach. 1. The way...

Learn More 3 0Oct 22 '24

JWT vs. PASETO: Which One is Right for You?

Introduction If you work with authentication in web applications, you’ve probably used...

Learn More 3 2Mar 21

Beyond JWT: Unlocking PASETO for Secure Token Management

In today's web world, secure connections are essential. JWT (JSON Web Tokens) is widely used for...

Learn More 3 0Jul 7 '24

Mastering JWT Authentication: A Complete Guide with MERN Stack

Authentication is a core aspect of web applications, ensuring secure access to sensitive data and...

Learn More 3 0Dec 15 '24

JWT: The Secret Code for Web Security 🔐

Imagine your web application is a party, and you need a way to ensure only the right guests get in....

Learn More 3 0Aug 30 '24

How Token-Based Authentication Works: A Practical Walkthrough

Authentication is essential for securing web applications. In this article, I will explain...

Learn More 3 1Mar 26