EUNO.NEWS EUNO.NEWS
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
  • All (20931) +237
    • AI (3154) +13
    • DevOps (932) +6
    • Software (11018) +167
    • IT (5778) +50
    • Education (48)
  • Notice
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 1 day ago · software

    Session-Based Authentication VS Token-Based Authentication

    !Cover image for Session-Based Authentication VS Token-Based Authenticationhttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,form...

    #authentication #session-based #token-based #JWT #web security #API design #scalability #stateless authentication
  • 3 days ago · software

    Please, Stop Redirecting to Login on 401 Errors 🛑

    The “Lazy” Pattern Why does this happen? Usually, it’s because the JWT access token expired, the backend returned a 401 Unauthorized, and the frontend code did...

    #JWT #401 #authentication #axios #frontend #UX #session-management #token-expiration #redirect
  • 5 days ago · software

    How to use JWT for authentication on Node.js

    !Cover image for How to use JWT for authentication on Node.jshttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format=auto/https%...

    #JWT #authentication #Node.js #web security #token-based auth #API
  • 6 days ago · software

    Understanding custom auth flow and its implementation..

    Custom Auth Flow Implementation Recently I was trying to really understand custom auth flow and how its implementation actually works. So I started rebuilding...

    #authentication #custom auth flow #JWT #refresh token #security #zod #email verification #password reset
  • 1 week ago · software

    Wallets Are the New Auth Layer

    Introduction If you have implemented authentication in Web2, Web3 wallets should not feel strange. Authentication has always been about one thing: Can this use...

    #authentication #web3 #wallets #identity #OAuth #JWT #security
  • 1 week ago · software

    Stop Rewriting Auth Logic: My Production-Ready Node.js + MySQL Boilerplate 🚀

    Introduction Every time I start a new Node.js project, I waste hours setting up the same authentication patterns: JWT handling, secure password hashing, databa...

    #node.js #authentication #jwt #docker #boilerplate #mysql #sequelize #security #clean-architecture
  • 1 week ago · software

    Building Auth Validation: 5 Lessons on Making Error Messages Actually Helpful

    Why you should care You're building a tool that connects to multiple external services—GitHub, AI agents, various APIs. Everything works fine… until it doesn't...

    #authentication #error-handling #validation #JWT #security #logging #developer-tools
  • 1 week ago · software

    Understanding API Authentication in C# : Mastering

    Basic Authentication Username & Password Basic authentication sends the username and password encoded in Base64. It is simple to implement but should only be u...

    #API authentication #C# #HttpClient #Basic Auth #Bearer token #JWT #OAuth #REST API #.NET
  • 1 week ago · software

    I built an auth backend for my own app — then tried selling it to see if it works

    Introduction When I started working on a new Android mobile app, I knew one thing for sure: I didn’t want to rewrite authentication logic again. Auth is one of...

    #authentication #JWT #refresh-tokens #backend-development #mobile-app #Android #auth-API #security #software-engineering
  • 2 weeks ago · software

    Session Tokens vs JWTs: The False Dichotomy

    JWTs vs. Sessions – Why It’s Not an Either/Or Decision The debate is endless, but you don’t have to pick a side. There’s a hybrid approach that gives you the b...

    #authentication #JWT #session tokens #auth design #stateless authentication #security
  • 2 weeks ago · software

    The JWT Algorithm 'none' Attack: The Vulnerability in 1 Line of Code

    JWT authentication is everywhere, but it’s also one of the most misconfigured security mechanisms. A single line of code can compromise everything. Attack demon...

    #JWT #authentication #security #vulnerability #CVE #none-algorithm #node.js #token #cryptography
  • 3 weeks ago · software

    Academic Suite Authentication & Authorization

    3.1 Authentication Approach in Academic Suite Academic Suite uses a stateless authentication approach with JSON Web Token JWT. Unlike session‑based authenticat...

    #authentication #authorization #JWT #stateless authentication #online exam system #web security #role-based access

Newer posts

Older posts
EUNO.NEWS
RSS GitHub © 2026