#authorization

[ follow ]
#rbac
fromInfoQ
3 days ago
Privacy professionals

Addressing Kubernetes Authorization with Cedar

Cedar enhances Kubernetes authorization with fine-grained permissions and seamless integration with RBAC.
fromHackernoon
1 year ago
Privacy professionals

How SaaS Companies are Changing Their Approach to Authorization | HackerNoon

Authorization defines user access to data and is often complex and challenging to maintain.
Emergence of tools like Oso is revolutionizing how developers manage authorization.
fromHackernoon
3 years ago
JavaScript

Implementing Secure Role-Based Access Control (RBAC) in a Next.js Application Using Permit.io | HackerNoon

Implementing Role-Based Access Control (RBAC) is an effective method for managing user authorization in applications.
fromInfoQ
3 days ago
Privacy professionals

Addressing Kubernetes Authorization with Cedar

Cedar enhances Kubernetes authorization with fine-grained permissions and seamless integration with RBAC.
fromHackernoon
1 year ago
Privacy professionals

How SaaS Companies are Changing Their Approach to Authorization | HackerNoon

Authorization defines user access to data and is often complex and challenging to maintain.
Emergence of tools like Oso is revolutionizing how developers manage authorization.
fromHackernoon
3 years ago
JavaScript

Implementing Secure Role-Based Access Control (RBAC) in a Next.js Application Using Permit.io | HackerNoon

Implementing Role-Based Access Control (RBAC) is an effective method for managing user authorization in applications.
more#rbac
#security
fromInfoWorld
3 months ago
JavaScript

How to use resource-based authorization in ASP.NET Core

Resource-based authorization in ASP.NET Core allows for finer control over access, especially in dynamic scenarios like document editing.
fromHackernoon
2 years ago
JavaScript

Code Smell 282 - Bad Defaults and How to Fix Them | HackerNoon

Treat unknown responses as unauthorized to mitigate security risks and prevent exploitation.
fromInfoWorld
3 months ago
JavaScript

How to use resource-based authorization in ASP.NET Core

Resource-based authorization in ASP.NET Core allows for finer control over access, especially in dynamic scenarios like document editing.
fromHackernoon
2 years ago
JavaScript

Code Smell 282 - Bad Defaults and How to Fix Them | HackerNoon

Treat unknown responses as unauthorized to mitigate security risks and prevent exploitation.
more#security
#authentication
fromAmazic
4 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices

Zero Trust requires constant verification of user identities and access rights, significantly enhancing security in modern network environments.
fromCodeProject
7 months ago
Information security

How to Secure APIs in Microservices with Spring Boot

API security in microservices focuses on protecting data and communications through various practices such as authentication and encryption.
fromMedium
3 years ago
JavaScript

Low-Code Solutions for Building Basic SaaS Features

Building a SaaS application requires experience in software development or utilizing low-code solutions.
fromHackernoon
3 months ago
JavaScript

JWT vs PASETO: What's the Best Tool for Generating Secure Tokens? | HackerNoon

JWT is widely used for web authentication and authorization, but flexibility can lead to cryptographic vulnerabilities; PASETO offers a more secure alternative.
fromAmazic
4 months ago
Information security

How Zero Trust redefines traditional authentication and authorization practices

Zero Trust requires constant verification of user identities and access rights, significantly enhancing security in modern network environments.
fromCodeProject
7 months ago
Information security

How to Secure APIs in Microservices with Spring Boot

API security in microservices focuses on protecting data and communications through various practices such as authentication and encryption.
fromMedium
3 years ago
JavaScript

Low-Code Solutions for Building Basic SaaS Features

Building a SaaS application requires experience in software development or utilizing low-code solutions.
fromHackernoon
3 months ago
JavaScript

JWT vs PASETO: What's the Best Tool for Generating Secure Tokens? | HackerNoon

JWT is widely used for web authentication and authorization, but flexibility can lead to cryptographic vulnerabilities; PASETO offers a more secure alternative.
more#authentication
fromCodeProject
6 months ago
JavaScript

Methods to Efficiently Upload Files to Amazon S3 Using Java

Setting up AWS SDK for Java involves adding dependencies, configuring credentials, and initializing the S3 client.
fromAmazic
8 months ago
DevOps

Cerbos Hub launches to separate and manage authorization policies at scale - Amazic

Cerbos has reached General Availability, emphasizing the need for managing authorization policies at scale.
Standardization in the authorization ecosystem is crucial for effective policy management.
[ Load more ]