Edidiong Asikpo (Didi)edidiongasikpo.hashnode.net·Jun 2, 2021TypingDNA Verify - A New Way to Authenticate UsersTwo-factor authentication (2FA) is a security process in which users provide two authentication factors to verify themselves. If you think I am referring to the traditional SMS and Email 2FA methods from what you read above, you are wrong. I am actua...Catalin Pit and 5 others are discussing this6 people are discussing thisDiscuss·175 likes·2.0K readsauthenticationGreat article! TypingDNA is very cool! 🔥 3
Victoria Lovictoria.hashnode.net·Aug 20, 2021FeaturedA Quick Beginner's Guide to Set Up Auth0 + ReactHello everyone, Hashnode's Auth0 hackathon is still ongoing. For those who have not used Auth0 before and just getting started on their hackathon projects to implement Auth0, here is a super quick step-by-step guide to set up and integrate it to a Re...Olubisi Idris Ayinde and 6 others are discussing this7 people are discussing thisDiscuss·163 likes·4.2K readsRandom Projects to Buildauthentication
Kieran Roberts jkbasjkbfbjaksbfjbjasbfjbdsjkfbkieranroberts.hashnode.net·Jun 4, 2021FeaturedLet's build a serverless Next.js app with Auth0 for authenticating usersLet's explore how we can integrate user authentication in a serverless Next.js app using Auth0 in a really simple way. We will be using a package called @auth0/nextjs-auth0 which was built to support user authentication in Next.js using Auth0 and wil...Victoria Lo and 6 others are discussing this7 people are discussing thisDiscuss·131 likes·3.1K readsEverything Next.jsReact
Ganesh Jcodemuscle.hashnode.net·Apr 25, 2023Locked and Loaded: The Importance of App Authentication in Today's Digital WorldAuthentication: Authentication can be very discouraging to build as a developer keeping various security features in mind. It is ideal to use or build authentication systems that don’t depend on 3rd party providers at all. Custom-building authenticat...Discussauthentication
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Apr 24, 2023Methods for Bypassing Authentication VulnerabilitiesOverview Authentication Bypass Vulnerabilities are common flaws in web applications today, but they are not always easy to find. With the continuous development of technology and the integration of various platforms, traditional authentication method...Discuss#cybersecurity
Jay Simonsdesignly.hashnode.net·Apr 24, 2023Creating a Basic Authentication Provider in Next.jsThere are several identity service providers out there that take the complexity and security considerations off the plate of the developer. There are also authentication libraries, such as next-auth, for Next.js. But sometimes you want to implement v...DiscussNext.js
Oleg Gulevskyyogulevskyy.hashnode.net·Apr 23, 2023Simple Steps for Including Custom Fields in Wasp Google AuthThe problem statement When using Google OAuth in Wasp project, you might notice that behind the scenes, whenever you are logging in the user, creates the user for you, if it doesn't exist. It does so with very minimal user fields, but what if you nee...Discuss·2 likesWasp
Tasnim Ferdousrenzhamin.hashnode.net·Apr 23, 2023Authenticate and protect REST API routes with JWT and refersh token rotationOverview After reading this article, you will able to Authenticate users with their username/email and password Understand the uses of accessToken and refreshToken Protect api endpoints from unauthorized clients by validating accessToken Allow mu...Discuss·2 likes·37 readsWeb Development
Sandeep Korrapatiphoenixdev.hashnode.net·Apr 23, 2023The OAuth 2.0 Odyssey: A Delightful Adventure into Web App SecurityIntroduction Ahoy, fellow explorers! Are you ready to embark on an epic journey through the fascinating world of OAuth 2.0? With this Hashnode blog post as your trusty compass, we'll navigate the vast ocean of this powerful authorization framework in...DiscussOAuth2
Anuj Pathakanujblogs.hashnode.net·Apr 23, 2023Unlocking The Future: How Brain Wave Authentication is Transforming SecurityWe are living in an age of revolutionary technological advancement, and with it comes a new wave of security measures. Brainwave authentication is becoming increasingly popular as a way to authenticate user identities and protect the data they access...Discussneuroscience
Mukul Padwalmukulpadwal.hashnode.net·Apr 22, 2023Secure and Easy Authentication with JSON Web Tokens (JWT)Introduction Authentication and authorization are critical aspects of building secure web applications. Developers need to ensure that only authorized users can access protected resources. One way to achieve this is by using JSON Web Tokens (JWT). In...Discuss·1 likeJavaScript
Deeksha Agarwaldeekshatw.hashnode.net·Apr 22, 2023How to Build a Real-Time Posting Social Media App with Firebase Realtime Database (Part 1- Authentication)Are you interested in building your own social media app, complete with real-time database functionality? Look no further! In this blog post, I'll walk you through the process of creating a fully functional social media app using Kotlin and Firebase'...Discuss·34 readsBuilding a Social Media App with Firebase Realtime DatabaseAndroid
FusionAuth teamforFusionAuth Blogfusionauth.hashnode.net·Apr 21, 2023Switchboard.app reduced their estimated migration time by 66% using FusionAuthTheo Gravity is a FusionAuth community member and senior engineer at Switchboard. He chatted with us over email about how he and his team are using FusionAuth to meet their auth needs. This interview has been lightly edited for clarity and length. D...Discussauthentication