DEV Community

# authentication

User authentication mechanisms

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Add Role-Based Access Control to Next.js 16 with Auth.js v5

How to Add Role-Based Access Control to Next.js 16 with Auth.js v5

1
Comments
3 min read
IAM 101: The Ultimate Guide to Identity & Access Management — Keycloak, Auth0, Clerk & More

IAM 101: The Ultimate Guide to Identity & Access Management — Keycloak, Auth0, Clerk & More

Comments
17 min read
OAuth 2.1 Is Here: What Changed, What's Deprecated, and How to Migrate Your App

OAuth 2.1 Is Here: What Changed, What's Deprecated, and How to Migrate Your App

1
Comments
14 min read
Auth.js v5 with Next.js 16: The Complete Authentication Guide (2026)

Auth.js v5 with Next.js 16: The Complete Authentication Guide (2026)

Comments
3 min read
Handling Authentication with JWT the Right Way in Node.js (2026 Edition)

Handling Authentication with JWT the Right Way in Node.js (2026 Edition)

Comments
17 min read
Making Shop Auth Accept Phone OR Email — A zod + TypeScript Fix

Making Shop Auth Accept Phone OR Email — A zod + TypeScript Fix

1
Comments
2 min read
Unified Authentication for OAuth2 and API Keys via Edge Token Normalization

Unified Authentication for OAuth2 and API Keys via Edge Token Normalization

Comments
9 min read
The Front Door of Cloud Applications: Simplifying Authentication with Amazon Cognito

The Front Door of Cloud Applications: Simplifying Authentication with Amazon Cognito

Comments
5 min read
Cryptographic Agent Identity: A Technical Solution to Bot Detection

Cryptographic Agent Identity: A Technical Solution to Bot Detection

Comments
6 min read
Dropping Email Required — Migrating to Phone OR Email Authentication

Dropping Email Required — Migrating to Phone OR Email Authentication

Comments
2 min read
JWT Token Explained: How to Decode, Debug, and Secure Your Tokens

JWT Token Explained: How to Decode, Debug, and Secure Your Tokens

Comments 1
1 min read
Addressing Security Risks: Replacing Unscoped API Keys with Fine-Grained Access Control in AI Agent Frameworks

Addressing Security Risks: Replacing Unscoped API Keys with Fine-Grained Access Control in AI Agent Frameworks

Comments
11 min read
Things I Learned While Building Custom Keycloak Themes

Things I Learned While Building Custom Keycloak Themes

Comments
3 min read
Designing Authentication Systems Across Multiple Identity Providers: Lessons from Real Failures

Designing Authentication Systems Across Multiple Identity Providers: Lessons from Real Failures

Comments
2 min read
Implementing FedCM Login in the oauth2-passkey Rust Library

Implementing FedCM Login in the oauth2-passkey Rust Library

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.