Data Science & Developer Roadmaps with Chat & Free Learning Resources

Filters

API Authentication

API authentication is a crucial aspect of securing your application and ensuring that only authorized users can access specific resources. There are several common authentication schemes used in APIs, each with its own strengths and weaknesses.

One popular method is Token-Based Authentication, where a user provides their credentials, and upon successful authentication, the server generates a token. This token is then used for subsequent requests, allowing the user to access resources without needing to re-enter their credentials each time. This method is particularly effective for stateless APIs, as it does not require the server to maintain session information 15.

Another common scheme is Basic Authentication, which involves sending a username and password with each request. While simple, this method can be vulnerable to interception if not used over secure channels like HTTPS 2.

Other methods include API Keys, which are unique identifiers for applications, and OAuth, which allows third-party applications to access user data without sharing passwords 23. Each method has its use cases, and the choice depends on the specific requirements of your application.

API Authentication with Tokens

 Miguek Grinberg Blog

In this article I'm going to show you a few common patterns for client authentication based on tokens, and how can they be implemented in a Python API back end. This method of authentication works…

Read more at Miguek Grinberg Blog | Find similar documents

Auth Schemes of REST API

 Towards Data Science

The user’s data is the underlying currency that is driving the API economy. Like any currency, you need to handle it with care and transport it with caution to prevent theft. Different devices and…

Read more at Towards Data Science | Find similar documents

A Better Authentication API

 Python in Plain English

Recently, I wrote a series of posts explaining how JSON Web Tokens could be utilized in an API that was written using Flask. However, a few weeks ago, I discovered how awesome FastAPI is and have…

Read more at Python in Plain English | Find similar documents

Creating Secure API’s with EasyAuth & FastAPI

 Analytics Vidhya

Currently the API is accessible and usable by anyone with a network connection that can reach the server: Instead of re-creating users, group, roles, & permission, centralize into a single auth…

Read more at Analytics Vidhya | Find similar documents

How to design a secure web API access for your website?

 ByteByteGo Newsletter

How to design secure web API access for your website? When we open web API access to users, we need to make sure each API call is authenticated. This means the user must be who they claim to be. In th...

Read more at ByteByteGo Newsletter | Find similar documents

API Security Best Practices

 ByteByteGo Newsletter

APIs are the backbone of modern applications. They expose a very large surface area for attacks, increasing the risk of security vulnerabilities. Common threats include SQL injection, cross-site scrip...

Read more at ByteByteGo Newsletter | Find similar documents

HTTP Basic Auth

 FastAPI Documentation

HTTP Basic Auth For the simplest cases, you can use HTTP Basic Auth. In HTTP Basic Auth, the application expects a header that contains a username and a password. If it doesn't receive it, it returns...

Read more at FastAPI Documentation | Find similar documents

How to secure the Rest APIs

 Javarevisited

Today let’s talk about the security to protect your APIs. In this article, you will learn and understand how to build and secure APIs with various security patterns.We will discuss the best practices ...

Read more at Javarevisited | Find similar documents

Secure Your Azure Functions Endpoints(Open API) with Basic Authentication (.NET)

 Level Up Coding

Introduction This guide explores integrating OpenAPI, the modern specification for APIs, to streamline the process. While basic authentication offers a simple approach, keep in mind it might not be su...

Read more at Level Up Coding | Find similar documents

Authenticating HTTP Requests in Modern Web Apps

 Level Up Coding

Ensuring a user is authenticated is an essential part of creating a modern web application. Today, we’ll be looking at a common approach using JWT access and refresh tokens with Axios.

Read more at Level Up Coding | Find similar documents

JSON Web Token and Web Authentication

 The Pythoneers

Unsure about how to get secure log-in sessions without crushing your servers? JWTs may be the answer to your concerns. JWT stands for JSON Web Token. These are, as the name suggests, tokens that…

Read more at The Pythoneers | Find similar documents

How to Secure your REST API using JWT

 Level Up Coding

You’ve probably heard that JSON Web Token (JWT) is the current state-of-the-art technology for securing APIs. So if you’re planning to use it, it’s important to understand how it works. This is a…

Read more at Level Up Coding | Find similar documents