Logo
Login
Tech Posts 31382
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

How Adaptive Authentication Keeps Users Happy Without Compromising Security

Authentication is important to make sure users have the right access to systems and data. This protects sensitive information from unauthorized access and breaches. However, a big challenge of modern ...
12.03.2025 0 Read More

Modern Authentication Methods OAuth, JWT, and Beyond

Authentication is at the heart of every secure web application. As frontend developers, understanding modern authentication flows and how to implement them securely is crucial. This article explores t...
05.05.2025 0 Read More

Secure Your RESTful API Using Keycloak Role-Based Access Control

Secure Your RESTful API Using Keycloak Role-Based Access Control
When building a REST API, security is a top priority. One of the best ways to manage authentication and authorization is by using Keycloak, an open-source Identity and Access Management (IAM) solution...
13.03.2025 0 Read More

OAuth 2.0 vs. OAuth 2.1: What’s Changed and Why It Matters

If you’ve worked with APIs or authentication flows, you’ve likely encountered OAuth 2.0. It’s been the go-to authorization framework for years, powering everything from social logins to secure A...
26.03.2025 0 Read More

Securing API Gateway with AWS Cognito Authentication using OAuth 2.0 and Custom Domains

Securing API Gateway with AWS Cognito Authentication using OAuth 2.0 and Custom Domains
Introduction In our previous post, we explored securing API Gateway using a Lambda Authorizer with JWT tokens via Terraform.Lambda Authorizer with JWT Token provides fine-grained access contr...
27.03.2025 0 Read More

Understanding OAuth/OpenID Response Types in .NET Web APIs

Have you ever wondered how applications let you "Log in with Google" or "Sign in with Microsoft" without asking you to create yet another username and password? In most cases, they use protocols calle...
31.03.2025 0 Read More

Custom Scopes in OAuth: Step-by-Step Guide

Custom Scopes in OAuth: Step-by-Step Guide
OAuth custom scopes allow you to control API access with precision. They define specific permissions for API actions, enhancing security, guiding developers, and organizing resources effectively. Here...
04.04.2025 0 Read More

OAuth2 Explained Simply — For Developers Who Hate Overcomplicated Docs

🧠 Introduction — OAuth2, Demystified You've probably clicked "Login with Google" or "Sign in with GitHub" more times than you can count. But have you ever stopped and wondered: What act...
06.04.2025 0 Read More

uri mismatch issue oauth2 | google | Error 400: redirect_uri_mismatch

uri mismatch issue oauth2 | google | Error 400: redirect_uri_mismatch
...
06.04.2025 0 Read More

🔐 OAuth 2.0 + OpenID Connect (OIDC) 🪪

🔐 OAuth 2.0 + OpenID Connect (OIDC) 🪪
O objetivo desse projeto é mostrar na prática o uso dos protocolos OAuth 2.0 e OpenID Connect.Para facilitar o entendimento, vamos supor que você quer usar uma aplicação web para desenhar diagram...
08.04.2025 0 Read More
Loading...
#reading
Gitcoin and the Evolution of Web3: Pioneering the Decentralized Future
0
When to Use `type` vs `interface` in TypeScript
0
From Pixels to Presence: The Era of Zero UI
0
Using Video Conferencing to Enhance Workplace Training
0
5 Practical Tips to Level Up Your Shopee Store
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
Beginner's Guide to the Model Context Protocol (MCP)
0
What is Model Context Protocol (MCP): Explained in detail
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
The Great AI Agent Protocol Race: Function Calling vs. MCP vs. A2A
0