DEV Community

# authentication

User authentication mechanisms

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Escaping the "Blind Phase": How to Debug OpenShift 4 LDAP & Active Directory Logins

Escaping the "Blind Phase": How to Debug OpenShift 4 LDAP & Active Directory Logins

Comments
4 min read
AWS Authentication: IAM Identity Center (SSO) - The right way in 2026

AWS Authentication: IAM Identity Center (SSO) - The right way in 2026

1
Comments
5 min read
Stryker Devices Compromised: Unauthorized Access, Data Wiping, and Entra Login Page Defacement by Handala-Linked Entity

Stryker Devices Compromised: Unauthorized Access, Data Wiping, and Entra Login Page Defacement by Handala-Linked Entity

Comments
12 min read
Authentication Patterns with Claude Code: JWT, Sessions, and OAuth Done Right

Authentication Patterns with Claude Code: JWT, Sessions, and OAuth Done Right

Comments
3 min read
What Are JWT Tokens and How Do They Work? A Beginner-Friendly Guide

What Are JWT Tokens and How Do They Work? A Beginner-Friendly Guide

1
Comments
5 min read
Passkeys Were Supposed to Kill the Password. Here's Why They're Stalling.

Passkeys Were Supposed to Kill the Password. Here's Why They're Stalling.

Comments
6 min read
I Built 6 Authentication Methods for My Laravel SaaS - Here's the Full Architecture

I Built 6 Authentication Methods for My Laravel SaaS - Here's the Full Architecture

1
Comments
8 min read
Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Comments
3 min read
Binding LINE Bot Users to Your ERP with Phone Number Matching

Binding LINE Bot Users to Your ERP with Phone Number Matching

Comments
3 min read
Instant Access for Users, Fast Integration for Developers

Instant Access for Users, Fast Integration for Developers

4
Comments
2 min read
How We Built X Submission Intake: From Social Chaos to Structured Pipeline

How We Built X Submission Intake: From Social Chaos to Structured Pipeline

1
Comments
4 min read
How to Authenticate AI Agents in B2B SaaS: Delegated Auth, Scoped Tokens, and Audit Trails

How to Authenticate AI Agents in B2B SaaS: Delegated Auth, Scoped Tokens, and Audit Trails

Comments 1
12 min read
Try Passwordless Auth: oauth2-passkey Live Demo

Try Passwordless Auth: oauth2-passkey Live Demo

1
Comments
3 min read
Why Passkeys Aren't Ready for Encrypting Your User Data (Yet)

Why Passkeys Aren't Ready for Encrypting Your User Data (Yet)

Comments
1 min read
Add Microsoft Authentication to Next.js in 5 Minutes

Add Microsoft Authentication to Next.js in 5 Minutes

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.