DEV Community

# authentication

User authentication mechanisms

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Addressing Security Risks: Replacing Unscoped API Keys with Fine-Grained Access Control in AI Agent Frameworks

Addressing Security Risks: Replacing Unscoped API Keys with Fine-Grained Access Control in AI Agent Frameworks

Comments
11 min read
Things I Learned While Building Custom Keycloak Themes

Things I Learned While Building Custom Keycloak Themes

Comments
3 min read
Designing Authentication Systems Across Multiple Identity Providers: Lessons from Real Failures

Designing Authentication Systems Across Multiple Identity Providers: Lessons from Real Failures

Comments
2 min read
Implementing FedCM Login in the oauth2-passkey Rust Library

Implementing FedCM Login in the oauth2-passkey Rust Library

Comments
7 min read
Escaping the "Blind Phase": How to Debug OpenShift 4 LDAP & Active Directory Logins

Escaping the "Blind Phase": How to Debug OpenShift 4 LDAP & Active Directory Logins

Comments
4 min read
AWS Authentication: IAM Identity Center (SSO) - The right way in 2026

AWS Authentication: IAM Identity Center (SSO) - The right way in 2026

1
Comments
5 min read
Stryker Devices Compromised: Unauthorized Access, Data Wiping, and Entra Login Page Defacement by Handala-Linked Entity

Stryker Devices Compromised: Unauthorized Access, Data Wiping, and Entra Login Page Defacement by Handala-Linked Entity

Comments
12 min read
Authentication Patterns with Claude Code: JWT, Sessions, and OAuth Done Right

Authentication Patterns with Claude Code: JWT, Sessions, and OAuth Done Right

Comments
3 min read
Passkeys Were Supposed to Kill the Password. Here's Why They're Stalling.

Passkeys Were Supposed to Kill the Password. Here's Why They're Stalling.

Comments
6 min read
I Built 6 Authentication Methods for My Laravel SaaS - Here's the Full Architecture

I Built 6 Authentication Methods for My Laravel SaaS - Here's the Full Architecture

1
Comments
8 min read
Auth0 vs Clerk vs Authon: Migrating Your Auth Layer in 2026

Auth0 vs Clerk vs Authon: Migrating Your Auth Layer in 2026

Comments 1
4 min read
Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Comments
3 min read
Binding LINE Bot Users to Your ERP with Phone Number Matching

Binding LINE Bot Users to Your ERP with Phone Number Matching

Comments
3 min read
Instant Access for Users, Fast Integration for Developers

Instant Access for Users, Fast Integration for Developers

4
Comments
2 min read
How We Built X Submission Intake: From Social Chaos to Structured Pipeline

How We Built X Submission Intake: From Social Chaos to Structured Pipeline

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.