Data Science & Developer Roadmaps with Chat & Free Learning Resources
API Authentication with Tokens
In this article I'm going to show you a few common patterns for client authentication based on tokens, and how can they be implemented in a Python API back end. This method of authentication works…
Read more at Miguek Grinberg Blog | Find similar documentsAuth Schemes of REST API
The user’s data is the underlying currency that is driving the API economy. Like any currency, you need to handle it with care and transport it with caution to prevent theft. Different devices and…
Read more at Towards Data Science | Find similar documentsA Better Authentication API
Recently, I wrote a series of posts explaining how JSON Web Tokens could be utilized in an API that was written using Flask. However, a few weeks ago, I discovered how awesome FastAPI is and have…
Read more at Python in Plain English | Find similar documentsCreating Secure API’s with EasyAuth & FastAPI
Currently the API is accessible and usable by anyone with a network connection that can reach the server: Instead of re-creating users, group, roles, & permission, centralize into a single auth…
Read more at Analytics Vidhya | Find similar documentsHow to design a secure web API access for your website?
How to design secure web API access for your website? When we open web API access to users, we need to make sure each API call is authenticated. This means the user must be who they claim to be. In th...
Read more at ByteByteGo Newsletter | Find similar documentsAPI Security Best Practices
APIs are the backbone of modern applications. They expose a very large surface area for attacks, increasing the risk of security vulnerabilities. Common threats include SQL injection, cross-site scrip...
Read more at ByteByteGo Newsletter | Find similar documentsHTTP Basic Auth
HTTP Basic Auth For the simplest cases, you can use HTTP Basic Auth. In HTTP Basic Auth, the application expects a header that contains a username and a password. If it doesn't receive it, it returns...
Read more at FastAPI Documentation | Find similar documentsHow to secure the Rest APIs
Today let’s talk about the security to protect your APIs. In this article, you will learn and understand how to build and secure APIs with various security patterns.We will discuss the best practices ...
Read more at Javarevisited | Find similar documentsSecure Your Azure Functions Endpoints(Open API) with Basic Authentication (.NET)
Introduction This guide explores integrating OpenAPI, the modern specification for APIs, to streamline the process. While basic authentication offers a simple approach, keep in mind it might not be su...
Read more at Level Up Coding | Find similar documentsAuthenticating HTTP Requests in Modern Web Apps
Ensuring a user is authenticated is an essential part of creating a modern web application. Today, we’ll be looking at a common approach using JWT access and refresh tokens with Axios.
Read more at Level Up Coding | Find similar documentsJSON Web Token and Web Authentication
Login session and can perform authentication and authorization Continue reading on The Pythoneers
Read more at The Pythoneers | Find similar documentsHow to Secure your REST API using JWT
You’ve probably heard that JSON Web Token (JWT) is the current state-of-the-art technology for securing APIs. So if you’re planning to use it, it’s important to understand how it works. This is a…
Read more at Level Up Coding | Find similar documentsHow You Can (And Why You Should) Secure Your API Keys
Simple best practices for protecting API keys Continue reading on Towards Data Science
Read more at Towards Data Science | Find similar documentsSecures APIs with a JWT Token
In the last post, we connected to a MongoDB server and used a real database to replace the dummy data storage. In this post, we will explore how to protect your APIs when exposing to a client…
Read more at Level Up Coding | Find similar documentsAPI Encryption Front End
I wrote a program on how to use a cipher to encrypt API keys. The output of that cipher was a .txt file containing the encrypted string and a .bin file with the decryption key. I wanted a graphical…
Read more at Level Up Coding | Find similar documentsSecurely Authorizing Connected Devices using API Tokens
When we think of authorization in app development, it’s usually from the perspective of a user that has specific roles and permissions. For example, a fitness app that tracks a user’s workouts might…
Read more at Level Up Coding | Find similar documentsSpring Boot — Securing API with basic authentication
Spring Boot — Securing API with basic authentication Introduction : In today’s article, we will discuss what is basic authentication and securing spring boot rest APIs using basic authentication. Pre...
Read more at Javarevisited | Find similar documentsHow to pass cookie in Swagger UI for Authenticating the APIs — API Documentations using Open API 3
In this guide, we’ll explore the implementation of Swagger for documenting your application’s APIs and discuss the process of authenticating APIs within Swagger using cookie-based JWT authentication. ...
Read more at JavaToDev | Find similar documentsAuthentication using JSON Web Tokens (part II)
In this article, I will show you how to implement a Spring Boot Application that makes use of JWT authentication for securing an exposed REST API.
Read more at Javarevisited | Find similar documentsRESTful Authentication with Flask
This article is the fourth in my series on RESTful APIs. Today I will be showing you a simple, yet secure way to protect a Flask based API with password or token based authentication.This article…
Read more at Miguek Grinberg Blog | Find similar documentsSpring Boot Authorization: Creating an Authorization Server for your Microservices
This article explains in detail about implementing an Authentication mechanism using a centralized Authorization Server and an API gateway.
Read more at Javarevisited | Find similar documentsBasic Authentication
The way to do a JAX-WS call with basic authentication is a little unobvious. Here is an example where Service is the service class representation and Port is the service port you want to access. Servi...
Read more at Essential Java | Find similar documentsAPI Security Essentials: Comprehensive Practices to Safeguard Your Data Exchange
Introduction In today’s interconnected world, where data exchange between applications and services is commonplace, the security of APIs (Application Programming Interfaces) is paramount. APIs serve a...
Read more at Level Up Coding | Find similar documentsAuthentication using JSON Web Tokens (part I)
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be…
Read more at Level Up Coding | Find similar documents- «
- ‹
- …