Explore >> Select a destination


You are here

fusionauth.io
| | philodev.one
2.9 parsecs away

Travel
| | oAuth is a hard to get into because of its (necessary) complexity. A basic understanding of the standard flow and the actors involved can help to make better decisions and understand the security implications of the choices.
| | www.rasikjain.com
3.1 parsecs away

Travel
| | Here are three scenarios for implementing authentication workflows. Internet Applications (Public facing) For internet web applications and APIs, Session based (SessionID cookie) and Token Based (JWT) Authentication can be implemented. Session Based: Implemented for a majority of traditional and stateful web applications. Once the user is authenticated, A Session state is created and stored in an external State server or SQL database. The Session state is identified by a unique SessionID....
| | www.mathieupassenaud.fr
2.7 parsecs away

Travel
| |
| | brunoscheufler.com
19.1 parsecs away

Travel
| JSON Web Tokens are a popular way of managing authorization and authentication policies for web applications. Sending around a base64-encoded token that can be verified by every service using it, enables uncomplicated (and stateless) application design compared to other mechanisms....