Explore >> Select a destination


You are here

ennabah.com
| | www.rasikjain.com
5.4 parsecs away

Travel
| | Here are three scenarios for implementing authentication workflows. Internet Applications (Public facing) For internet web applications and APIs, Session based (SessionID cookie) and Token Based (JWT) Authentication can be implemented. Session Based: Implemented for a majority of traditional and stateful web applications. Once the user is authenticated, A Session state is created and stored in an external State server or SQL database. The Session state is identified by a unique SessionID....
| | www.skeletonscribe.net
6.0 parsecs away

Travel
| | This combines RSnake's Popup & Focus URL Hijacking * with Paul Stone's login detection to enhance phishing attacks. The basic concept ...
| | cnr.sh
4.4 parsecs away

Travel
| | When I built WANT, I avoided adding OAuth2 sign-ins at first; I knew it'd be a headache. Instead, I used Devise, Rails's standard authentication framework, to handle email-based sign-ins.
| | blog.openreplay.com
24.8 parsecs away

Travel
| Everything about security for your SPA.