Overview: Key Concepts Learn about token based Authentication. Difference Between Access Token and Refresh Token. Why to use Refresh Token ? Access Token: Access tokens are used in token-based authentication to allow an application to access an...
When building secure applications, developers often come across two popular authentication and authorization mechanisms—OAuth and JWT. While they may seem similar, they serve different purposes and have unique use cases. In this post, we'll break dow...
Access Token As the name of this token clearly depicts that this token is for accessing something, or may be it grants the permission to access something—who knows? Well, let's dive in and find out! So if we jump towards the technical view point, the...
NextAuth (Auth.js) is a powerful and flexible authentication library for Next.js. It simplifies the process of adding authentication to your Next.js projects by providing built-in support for many authentication providers, including Google, GitHub, a...
In modern authentication systems, Access Tokens and Refresh Tokens play crucial roles in securing user sessions while maintaining a smooth experience. Although both are used in authentication, they serve different purposes. Access Token An Access Tok...
In Part 2 we introduced apis for User service, this post walks through implementing a User Service in Go using gRPC with PostgreSQL as the database. The service provides user authentication with JWT-based authentication. The implementation includes: ...
When developing the authentication and authorization system for an application, I had to choose between using sessions and JWT tokens. Sessions offered a straightforward approach: when a user logs in, the server creates a session and stores it on the...
Summary: Axios is a promise-based HTTP client that simplifies API calls with features like automatic JSON parsing, request cancellation, and better error handling compared to fetch. It can be used globally in React by creating an Axios instance. JSO...
Guards in NestJS are an essential part of the authentication and authorization pipeline. They allow us to control access to specific routes based on various conditions, such as authentication, roles, and request limits. In this article, we'll explore...
This blog will detail the steps required to setup JWT Authentication for invoking ERP SOAP and REST Services. Pre Requisites The SaaS user should have access to Security Console to setup JWT A local machine which can run OpenSSL commands to generat...