paint-brush
161 Stories To Learn About Authenticationby@learn
476 reads
476 reads

161 Stories To Learn About Authentication

by Learn RepoApril 7th, 2023
Read on Terminal Reader
tldt arrow

Too Long; Didn't Read

Learn everything you need to know about Authentication via these 161 free HackerNoon stories.

People Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - 161 Stories To Learn About Authentication
Learn Repo HackerNoon profile picture

Let's learn about Authentication via these 161 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

1. Set up a Flutter app and Implement Google Sign-In Using Firebase

How to set up a Flutter app and implement Google sign-in using Firebase.

2. The Good Things, and the Not So Good Things, About Working With Firebase

Most of the developers have heard for Google’s product called Firebase. It’s, how Google says “mobile platform that helps you quickly develop high-quality apps and grow your business.“. It’s basically a set of tools that most developers will need when building an app. In this article I’ll go over these tools, and point all the things you need to know if you choose to use Firebase.

3. About History and Irony of Logging (in)

The story of event logging begins at sea and is related to navigation. One of the important aspects of navigation is <a href="https://en.wikipedia.org/wiki/Dead_reckoning" target="_blank">dead reckoning</a>: estimating your current position based on course, speed and time from a known, observed point. In the end of 15th century, speed at sea was measured with a small wooden log. A so-called ‘Dutchman’s Log’ was dropped overboard from the bow of the ship and the navigator measured the time elapsing before it passed the stern.

4. The Simple & Efficient Way to Enable JWT auth in Laravel By Using PHP-JWT Module

I encounter this issue while working on an application for a client recently. Instead of using a JWT library build for Laravel, I used firebase/php-jwt to generate and authenticate users. Don’t ask why as there were many reasons behind this decision. If you are using any Laravel library for JWT like tymondesigns/jwt-auth then you don’t need this anyway, use the library if you want.

5. How to Integrate ‘devise’ and ‘omniauth-facebook’ Authentication To Your Rails App

Introduction

6. How to Build a Smooth Authentication Flow System with Firebase

This tutorial involves going through a step-by-step guide on how to set up the Firebase authentication service, and then a walk-through of how to implement it.

7. An Essential Guide to IAM (Identity Access Management) in 2022

The term IAM is one of the common you hear in cloud-native environments. What does such a system do? A fast and pragmatic introduction to IAM

8. JSON Web Token: How To Secure Your Data With JWT

A JSON Web Token (JWT) is an open standard (RFC 7519) that defines a way for securely transferring information between two parties. It can be used for an authentication system. As this information is digitally signed, it can be verified and trusted.

9. Auth0 vs Okta vs Cognito vs SuperTokens Compared (2022)

An in depth review of Auth0 alternatives for 2022: Auth0 vs Okta vs Cognito vs SuperTokens

10. How SuperTokens' Pre Built UI Can Be Used With VueJS

Protect your VueJs app with SuperTokens by easily adding authentication with pre-built and session management to your project right out of the box easily.

11. From A to Z: The ABCs of Secure Authentication for Enterprises

Having secure authentication measures in place isn't optional. We cover everything your organization needs to know about secure authentication from A to Z.

12. Why You Should Use IAM Policies to Enforce MFA on AWS

In my past life, I was an auditor and performed hundreds of cybersecurity readiness assessments. These were sometimes called “gap analysis” and the essential purpose of these assessments were to provide organizations with the answers to the test for their upcoming official assessment.

13. How to Authenticate Your Git to GitHub with SSH Keys

Authenticate your local machine git's to GitHub using SSH authentication. You do not need to type username and password anymore with this easy addition.

14. What Developers Mean When They Talk About API

API has become one of those catch-all terms that developers throw around without really considering the context. On any given week, you will come across discussions like "How to use the Twitter API", "New framework X is great because it has a low API surface", and "Best practices for building an API."

15. The Future of Authentication

Strong authentication's war is fought not in the trenches of password management along with more complex passwords, passphrases, or even better multifactor authentication. Instead, this war must start with fundamental authentication processes as none of the current options will become a long-lasting silver bullet.

16. Google's Authenticator App Explained and Reviewed

Such a cool-sounding term, I had to find out its meaning and purpose. So here is the story.

17. Secure Sessions in JavaScript: Forking Express-Session to Improve Security

If you ever made a webapp in JS, chances are you used Express as a web framework, Passport for user authentication and express-session to maintain users logged in. This article focuses on sessions and how we forked express-session to make it more secure.

18. Authentication Using the Auth0 to a React Application

Application example built with React with authentication using the Auth0 service.

19. How to Implement One Tap Google Sign-In With Ruby on Rails

In this blog post, we will discuss how to integrate Google Identity Services into any of your front-end applications.

20. How Can You Improve Your Cybersecurity With Continuous Authentication

Standard authentication methods such as multi-factor authentication (MFA) and one-time passwords work as filters at the entrance of the protected perimeter. But what if someone managed to trick these filters or changed the user after their successful login? Cyber attackers may steal credentials of legitimate users and even one-time passcodes using malware and different phishing techniques. In the companies without special employee monitoring software, employees often nonchalantly share their logins and passwords with colleagues. Finally, there’s always a risk of someone getting a hold of a corporate device such as a laptop or smartphone with full access to the corporate network, critical resources, and applications.

21. How to Secure Your Flask Application with Ory Kratos and Ory Keto

How to secure a flask application using Ory Kratos and Keto to easily add authentication features into your program without needing lines and lines of code.

22. Nextjs User Login Authentication in 5 Simple Steps Using Auth0

In this post we are going to discuss, how you can set up a user Login authentication using Auth0 in Next.js projects.

23. Application Authentication: AWS Cognito vs JSON Web Token

Explore the difference between two well-known Auth building methods: AWS Cognito and JSON Web Token. Plus, take a look at the AWS Cognito application process.

24. An Overview of OAuth Fundamentals and Flows

OAuth flows are essentially OAuth-supported methods for verifying permissions and resource owner information.

25. Using $auth Module’s Redirect in Tandem With $router.push in Nuxt.js

Recently I came across the issue of using the auth module in Nuxt.js and invoking a $router.push in subsequent line of code in the same method. The conundrum began when the lines after the auth.loginWith method did not execute as intended since the page was redirected to the redirect URI.

26. Using SuperTokens in a VueJS App With Your Own UI

Learn how to build your own login UI with SuperTokens in your VueJS application.

27. Extending Your Login Flow With Auth0 Actions

In this article, I am going to explain what is Auth0 Actions, why to use them, and how to set one up.

28. Random Password Generator Command in Linux we Rarely Use

Password generators are now in abundance. Particularly surprising are the many web applications for this purpose.

29. Express-js Boilerplate with User Authentication

I couldn’t find a complete user authentication system for Expressjs, so I wrote this one.

30. A Quick Guide to JSON Web Token [JWT]

JSON Web Token (JWT) is an open standard (RFC 7519) for securely transmitting information between parties as JSON objects.

31. HELP! There’s a JWT in my Metaverse!

Are JWTs really dead, or are they just misunderstood? In this article, Patrick Lee Scott explores the usage of JWTs in a web3 world.

32. Passwordless vs MFA: The Future of Authentication

A passwordless approach is not the end-all-be-all for data security, but it is the start of establishing a single, strong user identity and trust.

33. SSO Infrastructure Cyber Attacks - Learn How to Detect Early and Mitigate the Risk

With the increasing cybersecurity threats, businesses are now more concerned about cybersecurity hygiene and are swiftly adopting security mechanisms, like single sign-on (SSO).

34. Protecting Your Supabase App With SuperTokens Authentication

Learn reasons why you should choose SuperTokens as your auth provider and why it pairs so well with Supabase in protecting you and your online infrastructure

35. What Makes Zero Trust Better And Different From Traditional Security

Traditional vs zero trust? Learn how zero trust outperforms the traditional model by delivering improved security, flexibility and reduced complexity.

36. An Introduction to Code Signing Architectures and Techniques

In the recent past, many technology firms were being targeted by hackers to tamper and corrupt the source code. These attacks heavily impact brand reputation and also leads to huge losses for firms victimized. To tackle this scenario, Code Signing techniques can be used for safeguarding the code integrity and to provide authenticity of the author to the end-user by providing digital signatures. Code Signing provides secure and trusted distribution of software preventing tampering, corruption and forgery. Code signing improves end-user confidence in software/code integrity and sender authenticity.

37. Digital Identity Around the World: Why Some Countries are Embracing Self Sovereign Identity Quicker

This article outlines the questions and logistics to consider when countries adopt or adapt new privacy laws and self-sovereign identity.

38. Are Social Logins More Secure?

Social logins are more secure than the traditional username/password.

39. What Is a JSON Web Token (JWT)?

JWTs or JSON Web Tokens are most commonly used to identify an authenticated user. They are issued by an authentication server and are consumed by the client-ser

40. Building a Simple Session Based Authentication using Ruby on Rails

Building your first authentication system may look intimidating at first. But to be honest, it's really easy. After reading this article, you will know how easy it is to create a session based authentication in rails.

41. What is OAuth (Open Authorization) and Why is it Important?

First of all, we want the users to be authenticated - confirming that the users are who they say they are. Then, authorize them - to enable selective access.

42. Jwenky: An Express API Server with User Authentication

Jwenky is an API server coded in Express framework.

43. Authentication using the Auth0 to an Angular application

Application example built with Angular 14 with authentication using the Auth0 service.

44. My Journey Integrating Google Calendar (G-suite) in Node

In this article, I’ll walk you through the agony of consuming Google Calendar API in Node with non-existent documentation. Particularly, accessing data using service account with domain-wide authority.

45. Mutual Human Authorization: A New Standard in Data Privacy

Mutual Human Authorization is a digital communication protocol that SharePass is pioneering to help address persistent data privacy and security gaps.

46. YubiKey Introduction: GCP Service Account Key Generator

Or how to stop leakage of your keys once and for all

47. Using Devise In Your Ruby on Rails Application [A Step-by-Step Guide]

Authentication. You don’t always want your users to have faceless sessions that open your application without leaving any trace.

48. How to Hide Credentials in Spring Boot

Use env properties in spring boot to add the environment variables.

49. How to connect SuperTokens to a MySQL or to a PostgreSQL database

Learn how to connect a self-hosted SuperTokens core to a database with or without Docker

50. How to Add Authentication to a Full Stack MERN Web Application

This article is part 2 of "Let's build and deploy a full stack MERN web application".

51. Authentication: Create a Simple Rick and Morty Wiki Page

Authentication is the most important part of any application. Learn more about it!

52. From Passwords to Passwordless Authentication

Passwordless authentication is gradually replacing the password-based authentication practice. The CIA triad of Cybersecurity is changing rapidly. Learn how.

53. How to Build A Passwordless Authentication with Email and JWT

In this quick article, you'll see how to prevent one of the OWASP Top 10 security issues for websites: authentication that hasn't been implemented correctly.

54. Understanding Roles-Based Access Control (RBAC)

Learn about RBAC and advantages + disadvantages compared to ABAC.

55. How I Built a Static Website with User Authentication and Dynamic Database for Free

How I built a functional static web app with user authentication and dynamic database for FREE using Webflow, Vault Vision, Cyclic and Airtable with #LowCode

56. OAuth 2.0 for Dummies

OAuth 2.0 is the industry-standard protocol for authorization.

57. A Brief History in Authentication

Photo Credits: Edward Tin

58. How to Add a Social Login to Your Website with SuperTokens (Custom UI Only)

This tutorial walks you through integrating your frontend with social login APIs provided by SuperTokens.

59. How Face ID and Touch ID Work: A Gentle Introduction to WebAthn

The Web Authentication API (also known as WebAuthn) is an API that enables strong authentication with public-key cryptography and passwordless authentication.

60. Using Session Cookies Vs. JWT for Authentication

HTTP is a stateless protocol and is used to transmit data. It enables the communication between the client side and the server side. It was originally established to build a connection between web browsers and web servers.

61. Adding Auth Flow Using SuperTokens into a React and Hasura GraphQL App

62. Digital Authentication: Notes on The Road To Passwordless Authentication

An introduction to the most popular authentication strategies along with some emerging solutions.

63. HMAC and MAC Explained: How To Build Secure Authentication With JWTs

HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. Let's take a look at how they work!

64. MFA Vs. 2FA: Which Is Better And More Secure

Your 8-character password with numbers, symbols, lowercase, uppercase, and special letters are not enough to shoo away hackers! What to do then? Find out here.

65. How Big Tech is Working Towards a Password-Free Future

A 2019 research conducted by HYPR showed that 78% of people forgot their passwords and required a reset within the last 90 days. Passwords aren’t just difficult to manage, they are inconvenient, insecure, and expensive because passwords are just too easy to guess, hack or intercept and what’s more, the legacy of password reuse is leading to constant attack and account vulnerabilities.

66. How To Add Authentication To Your Apps and dApps

I co-founded a developer toolkit company with the explicit goal of making decentralized applications easier to use. However, the tools aren't just for decentralized applications. Traditional application developers can make use of SimpleID to add authentication and storage to their app quickly and with zero overhead. Let me show you how easy it is.

67. How to Build an Authentication Flow with React Navigation v5

In this tutorial I will be building two screens i.e. a signup screen and a signin screen using react navigation v5

68. How Does HTTP Authentication Work

HTTP provides a general framework for access control and authentication. The most common HTTP authentication is based on the "Basic" schema. This page shows an introduction to the HTTP framework for authentication and shows how to restrict access to your server using the HTTP "Basic" schema.

69. Connecting an Apigee Edge API Proxy with Auth0 Platform

In the step by step tutorial learn how to use external OAuth for authentication & Access token created by the external system to secure APIGEE edge

70. Alternatives to Identityserver4: What are the Best Options and the Near Future of Identityserver

IdentityServer4 will have a new licensing policy in 2022. What should you expect from such drastic changes?

71. Implement Authentication & Security Using SuperTokens in Your React and HarperDB App

72. How To Implement Facebook Authentication And Authorization In Server-Side Blazor App

Introduction

73. Authentication and Authorization with bcrypt In Rails

Introduction

74. .NET Authentication Security Notes

In this article, we discuss how to protect users' authentication and session in .net, as well as Identity Server configuration.

75. How to Build Software With Low Vendor Lock-in

We discuss some thought processes on how vendors can build software with low vendor lock-in.

76. Deploying SuperTokens with React and NodeJS on Vercel

This tutorial will guide you on how to add SuperTokens to a React and Express app deployed on Vercel

77. How to Streamline your Login Experience via Passwordless SSO

Using YooniK technology to create a passwordless single sign-on experience using the OpenID Connect protocol.

78. Authentication Middleware in Express Gateway using JWT

I was trying to create my first actual microservice program and very soon I faced an issue: "How many times I should do the authentication?"

79. Firebase Auth using Facebook Log-In in Expo, React Native

Originally published on melvinkoh.me

80. No Password is Better than A Strong Password

Passwords have been on the decline for more than a decade. But eventually, we will face a time when it is no longer proof of our digital self.

81. Authorization With User Roles (RBAC)

Authorization is all about answering the question “Is this user allowed to do a certain operation?”. In this post we go over how you can implement RBAC

82. Common Attack Vectors that Authentication Services are Faced With

Hacking user accounts on many websites is still easier than it could and should be. This blog post helps you secure your application against identity theft.

83. Implementing Google Authentication and Fetching Mails from Scratch Using Python Django

Google Authentication and Fetching mails from scratch means without using any module which has already set up this authentication process.

84. The Achilles Heel of Authentication in 2020

I spoke to developers all over the world to find out what are the most pressing authentication pain points in 2020? The results are in.

85. The History of Biometric Technology: From 1960 - 2020

Modern biometric technology began in the 1960s, evolving into high-tech scanners that read bio-markers with an accuracy touching 100%.

86. Authentication in an Angular Application Using Supabase

Application example built with Angular 14 with authentication using the Supabase service.

87. How to Authenticate With OpenID Connect and Apache APISIX

In this post, I want to demo how to use OpenID Connect using Google underneath and then switch to Azure.

88. Setting up 2FA on 9 Popular Apps & Services Before Safer Internet Day

How to enable 2FA and what is two-factor authentification is. Set it up before Safety Internet Day which is celebrated on February 8 and make you apps secure

89. Do Passwordless Technologies Have an Impact on Cybersecurity?

Contrary to popular belief, traditional passwords are not the best way to protect sensitive information on our digital devices.

90. Security Best Practices for Node.js Apps

Node.js Security Guide

91. Express.js Integration Guide for Passwordless Authentication with DID.app

Just want the code? Find this example on github

92. Creating a Middleware in Golang for JWT based Authentication

Golang has been a popular language over the past few years known for it's simplicity and great out-of-the-box support for building web applications and for concurrency heavy processing. Similarly, JWT (JSON Web Tokens) are turning into an increasingly popular way of authenticating users. In this post I shall go over how to create an authentication middleware for Golang that can restrict certain parts of your web app to require authentication.

93. Authentication using the Amazon Cognito to an Angular application

Application example built with Angular 14 with authentication using the Amazon Cognito service.

94. Revoking Access to JWT tokens with a Blacklist/Deny List

Learn how to maintain a JWT blacklist / deny list using an in-memory data cache.

95. How To Create User Profile Page for E-Commerce Android App

We are going to create an android UI for our UserProfile backend API we are creating for our demo E-commerce tutorial

96. 3 Reasons for B2C Enterprises to Implement Single Sign-on Authentication

Single sign-on authentication, or SSO, is becoming more commonplace as the digital revolution continues to evolve. With numerous benefits for customers and companies alike, SSO helps streamline user experience, aid movement between applications and services, and secure the transfer of pertinent information about customers between organizations.

97. 80% Devices in 2023 Are Already Passkey-Ready: Apple, Microsoft, and Google Pushing It Even Higher

Since the 3 digital leaders, Apple, Google, and Microsoft, are pushing passkeys as the new login standard, the current technical support for passkeys is high

98. Implementing Social Login for a React and Backend App

Implementing Social Login: A Step-by-Step Guide in React with Typescript. How to add Github and Google login for users and taking advantage of the social netwo

99. How Law Enforcement Agencies are Using Biometrics

Here's why law enforcement agencies like the FBI and police use biometric technology to enhance their security and to protect them from unauthorized access.

100. Poor Man’s Authorization: How to Implement RBAC for REST API with OPA

When it comes to application permissions, two results emerge from this situation:

101. So, Like, What is an API Key Really? And How Does it Provide Security?

An API key is a secret code that gets you inside. Yeah it does!

102. AssumeRoleWithWebIdentity WHAT?! Debugging the Github to AWS OIDC InvalidIdentityToken Failure Loop

We encountered the InvalidIdentityToken error with the AssumeRoleWithWebIdentity method - we'll dive into how to fix it.

103. Bringing Top 5 Unconventional Identity Verification Solutions to The Table

Enterprises must not think twice before integrating themselves with AI-powered online identity verification processes to combat chargeback, counterfeits

104. About Kubernetes Authentication

There are 3 steps that Kubernetes uses to enforce security access and permissions are: Authentication, Authorization and Admission. In this article we are going to consider Authentication first.

105. What is Single Sign-On about?

We hate filling out forms, right? What if we can skip it? Thanks to single sign-on, it is possible.

106. How Routee's Two Factor Authentication Works

Two Factor Authentication or Two Factor Verification is a service used to confirm a user’s identity by combining two different elements. For example, Routee service combines a unique code with a verified phone number. This service can be used as part of an app or a website sign up process to increase security for the services offered.

107. Could a Decentralized Login Have Prevented @Jack's Hack?

A possible solution to single-factor and multi-factor authentication methodologies using decentralized login (DLI).

108. One-Time Password Generation Using speakeasy, Nest.js And MongoDB

Here, we have designed and developed a flow for OTP(One time password) for user registration and also blocking a user's account after the maximum retries for incorrect otp is exceeded.

109. Authentication in React with Firebase

Sometimes we want to implement authentication for multiple reasons and we don't want to create an API just for the authentication or maybe we are not backend developers. That's why Firebase provides authentication backend services easy to use. It supports authentication using passwords, phone numbers, popular social networks like Google, Facebook and Twitter, and more.

110. How to Configure Your Preferred User Stores to Authenticate Users using WSO2

WSO2 Identity server allows keeping multiple user stores for your system to store users and their roles. There should be one primary user store (mandatory) and any number of secondary user stores(optional). When creating a secondary user store we can provide a user store domain name for the secondary user stores. “PRIMARY” is the user store domain of the primary user store.

111. How To Create A User Portal On Airtable With Sync Inc And React

In this tutorial, you’ll see how to build a scalable, secure, and flexible client portal on Airtable using Sync Inc, Cotter, and Next.js.

112. Web Auth Standard: Guide to Web Authentication API

Secure context This feature is available only in secure contexts (HTTPS), in some or all supporting browsers.

113. How to Customize Devise Authentication with Active Storage

It is really difficult to imagine an application without a very secure authentication module, they vary from one to other, but almost always having common components, like a form to introduce a user name or email, their password, maybe some social media authentication, even biometric inputs.

114. Configure MongoDB with Kerberos Authentication

The MongoDB database administrators in a large enterprise may need to configure MongoDB to support Kerberos Authentication. The configuration of MongoDB with Kerberos authentication is very simple, provided you have some Kerberos knowledge. The MongoDB documentation article, Configure MongoDB with Kerberos Authentication on Linux, is pretty extensive on this topic. However, the article states — “Setting up and configuring a Kerberos deployment is beyond the scope of this document”, resulting in some of the starters/enthusiasts with limited knowledge in Kerberos not proceed any further. This article is geared more towards bridging that gap and to help you understand

115. How To Improve Banking App Security With GPS Data

Mobile-based fintech solutions are becoming the first port of call for many financial services, as people embrace the simplicity, cost-effectiveness and speed of mobile payments. However, digital fraud is rising as fast, if not faster, and thus fraud monitoring based on robust customer authentication have become as important as the services mCommerce has to offer customers.

116. Basic Elixir Api Guide

Elixir represents relatively new programming language for wider audience. It was published back in 2011, and is in development ever since. His main trait is that adops functional pardigm because it is built on top of Erlang and runs on BEAM(Erlang VM).

117. UMA (User-Managed Access) 2.0: How It Works And What It Can Be Used For

User-Managed Access (UMA) is an OAuth-based access management protocol standard. Introduction to UMA and where it can be used.

118. Hashing, Salting, and Verifying Passwords in NodeJS, Python, Golang, and Java

How to hash and salt passwords in different languages and why it's important to do so

119. Learnings From The Meow Bot Attack on Our MongoDB Databases

and ever since then we never look at a kitty the same way again. meow!

120. The Business Costs of Compromised Passwords

Passwords and Their Ability to Bring Down Even the Largest of Enterprises

121. Setting Up Authentication for AWS EKS

Amazon Elastic Kubernetes Service (EKS) is one of the leading managed Kubernetes solutions.

122. Building an Airtight Security Funnel Step-by-Step

In this article, we’ll walk through SharePass’s patent-pending security funnel, providing a step-by-step guide to building out your security pipeline.

123. Biometrics and Mobile Apps: Reducing Friction with a Focus on Security

The future of biometrics in the mobile paradigm is bright. But what does this mean for users?

124. Biometrics And The Future Of Tracking

Almost any organization experiences one of the main problems with the personnel policy - personnel discipline. It is particularly relevant for large companies. Here are several unpleasant consequences that this problem leads to. First of all, these are quite tangible hidden costs due to insufficient production of goods and services, foregone turnover, loss of important customers, and other losses from the irrational use of working time by employees. Let's say an employee takes 15-20 extra minutes every day to be late, protract a lunch break, have smoke breaks, go home early, and other things. Shouldn't be too hard to calculate that eventually it all takes an entire working day from one working month. In reality, people spend much more working time on personal needs: up to 35%.

125. Using OAuth Authentication to Serve Static Internal Documentation

Let's walk through how to deploy Docusaurus behind an OAuth proxy which will force users to log in with a 3rd party provider before viewing our documentation.

126. Auth in a React App with AWS: How Does It Really Work?

For this Tech Stack in 10, I'm diving into some best practices for using authentication in your full stack application with AWS Cognito, DynamoDB, and AppSync.

127. Digital Signatures in Cryptography: Types, Applications, Process

What is a digital signature? It’s probably not what you think it is… in fact, you’re using several right now…

128. Authentication Vs. Authorization [Infographic]

In online protection systems, authentication and authorization play an important role. They confirm the user's identity and grant your website or application access. In order to decide which combination of web tools best fits your security needs, it is important that you notice their differences.

129. How To Protect Your Online Applications From Pass-the-Cookie Cyber Attacks

How to strengthen your online apps against cloud service attacks such as ‘pass-the-cookie’ attacks.

130. Authentication Tools For Developers: A Comparison

When I first started learning to code, I went through more tutorials than I can count. I built so many todo list apps that I can’t even use a todo list without wondering if someone built it as a tutorial then turned it into a product. I learned CRUD (create, read, update, delete). I learned frameworks (React, Angular, Vue). I learned so much, but in every tutorial, something was missing. Something critical.

131. 4 Dangers of Sticking with Outdated MFA Methods

Adopting Multifactor Authentication is just the start of securing your digital systems, but outdated MFA methods can still present vulnerabilities if unchecked.

132. How You Can Add Multi-Factor Authentication To Your Application

In light of countless security breaches across the industry, multi-factor authentication is becoming increasingly popular. Let's look at the available options!

133. How to Implement a Forgot Password Flow (With Pseudo Code)

What should happen on the backend when a user forgets their password? Read to find a pseudo code implementation of the simplest way to reset passwords securely.

134. Biometric Authentication - Working, Methods, and Use Cases

Biometrics is a scientific term for the physical or behavioral characteristics of humans. Biometric authentication is biometrically enabled data protection.

135. NFTs for Authorized User Registration - Part 2

How can NFTs be used as part of an authorized user registration? Here's how.

136. Building a Login Screen With React and Bootstrap

Build an elegant login screen super fast using React and Bootstrap

137. Best Practises For Protecting Your Email

Ever get a Microsoft security alert email? One out of every 412 emails contains a malware attack. It doesn’t matter if you’re just a person sitting comfortably at home or a dedicated worker pushing one email after the other with short breaks of sweet old coffee. Every one of us is susceptible to these attacks and in a slightly twisted way we should all expect them. They could come in all shapes or sizes, and if you don’t want to lose a speech for your “Dyno week” conference that you spent a 100 hours writing maybe you shouldn’t let your friend open an email link with the subject line “Nude pictures of Anna Kournikova.”

138. An In-Depth Comparison of OAuth and JWT (JSON Web Tokens)

Learn about the difference between JWT Token and OAuth

139. How to Execute a Scheduled Task in Keycloak on Startup

In this article, we will look at how to execute a scheduled task in Keycloak on startup using a Kafka consumer as an example.

140. How Zero Trust Vendors are Concealing the Truth About This Robust Mechanism?

With the increasing cybersecurity risks and breaches in the past couple of years, businesses are now moving with a clear vision to incorporate zero-trust architecture into their platforms.

141. How To Improve Your Signup Flows

Login and signup processes are one of the most underrated tasks when building and upgrading a website or platform... or multiple ones. However, on this kind of development tasks, implications go far beyond asking for an email and a password: security issues, user experience, customer profiling, different tech stacks compatibility and adaptation...

142. You Probably Don't Need OAuth2/OpenID Connect: Here's Why

And the great news is, if the need for OAuth2 and OpenID Connect arises, you can use Ory again to add these on top!

143. Firebase Authentication with Email and Password in Flutter

Make use of Firebase Cloud Functions and Firestore to Authenticate in Flutter. SingInWithEmailAndPassword, HTTP Callables and Trigger, and more.

144. Identity Governance: Why Enterprises Don’t Implement It?

Maintaining the digital environment of an enterprise is a complex task and it takes more than technology to make things right. Businesses are in continuous need of regulatory controls like identity governance to maintain their brand value and simultaneously control their resources.

145. Overriding the SuperTokens APIs for Custom Usecases

In this blog we discuss how to customize the auth APIs provided by SuperTokens using its “Override” feature"

146. Authentication in Web Apps: Connecting Auth0, ASP.NET Core and Nuxt.js

User authentication and authorization can be difficult and time consuming. Getting it wrong can also have disastrous consequences, such as malicious users accessing and stealing personal or sensitive information from your app.

147. Introduction to Cryptography: Vigenère Cipher [Part 2]

Hi again and welcome back to part 2 of the basic cryptography. Previously we discuss about what is cryptography and how fundamental and ancient problem it is in communication science. We talk about ceaser's cipher and how easy it is to break. We also talk about Substitution Cipher which was slight improvement to Ceaser' cipher but can easily be cracked using Frequency analysis technique.

148. JSON Web Auth Using Angular 8 and NodeJS

The article is about interfacing an Angular 8 Project with a secure backend API. The Backend will be running on Node.JS. The security that will underlay the interfacing will be JSON Web Tokens.

149. Ensuring Security: A Guide for Web and Mobile Application Development

Authentication and authorization for modern web and mobile applications are a key part of most development cycles. This story outlines some considerations.

150. Introduction to IDaaS and its Applications

If you're reading this article, you might be interested to learn how to implement user management for your application, understanding the complete picture of how identity management services work. That's what we'll do in this article. You'll learn what is Identity as a Service (IDaaS), why to use such a service, what is Single Sign-On (SSO), and IDaaS platforms.

151. The Pain Of Making A Blockchain App From Scratch

So easy, an ape could do it. Thoughts from the lead developer and Top Ape at SnowApe, a Web3 real money gaming project that made a blockchain app from scratch.

152. Why IAM Architects Prescribe Enterprise Application Security

The widespread use of modern applications by enterprises come at a cost of data breaches. For this reason, Identity and access management or IAM architects have

153. Authenticate Users Via Face Recognition On Your Website or App

Learn how to authenticate users on a typical website or web application via face recognition instead of the traditional login/password pair.

154. The Difference Between OAuth 2.0 And Session Management

There seems to be a lot of misinformation on when OAuth 2.0 (henceforth referred to as OAuth) is appropriate for use. A lot of developers confuse OAuth with web session management and hence end up using the wrong protocol / set of technologies. This, in turn, leads to security issues. This article will clarify when to use regular session management solutions and when to use any one of the OAuth flows.

155. How to Properly Authenticate Your Emails

Learn what email authentication is and how to authenticate your email properly using email authentication protocols such as SPF, DKIM and DMARC.

156. NFTs for Authorized User Registration - Part 1

How does using an NFT as part of an MFA login work? Here's how.

157. The Ultimate Guide To Custom Role Based Access Without Third Party Libraries

Here, we have four roles: Sme, Sponsor, Admin, Operations.Initially, we had only 3 roles.Operations role was added later and Operations user has permissions similar to the Admin user.In the code, we had to replace every instance of if (user.type == USER_TYPES.ADMIN) with if (user.type == USER_TYPES.ADMIN || user.type == USER_TYPES.OPERATIONS).As this is time consuming and we can also miss many instances, we have created a roles module. In the roles module,the roles are defined along with their respective permissions as seen in Code (Part-III). Based on the permissions for each role, we will evaluate the authorization for the user in each of our controller methods.If the user has access, only then he will be granted the resources.

158. Configuring Single Sign-On for Zoom With WSO2 Identity Server

In the wake of remote working, Zoom has become one of the most essential tools for video conferencing. This blog discusses how you can configure single sign-on (SSO) for Zoom with WSO2 Identity Server.

159. The HackerNoon Podcast: Let's Talk About Sec, Baby

Amy Tom talks to Jeff Morris, VP of Product & Solutions Marketing at Couchbase, and Mike Schwartz, Founder & CEO of Gluu on The HackerNoon Podcast

160. Validating a User Phone Number With SMS on Auth0 Using ZENVIA

Application example using Angular where a simple WEB application will be implemented to validate the user phone by SMS in the authentication.

161. A React HOC for AWS Cognito to Simplify User Authentication

TL;DR: AWS Cognito offers robust handling of user Authentication flows, including via Social Providers such as Google and Facebook. Here we describe a Higher Order Component for your ReactJS Web App, and how to configure Cognito.

Thank you for checking out the 161 most read stories about Authentication on HackerNoon.

Visit the /Learn Repo to find the most read stories about any technology.