Application Authentication: AWS Cognito vs JSON Web Token Post date November 8, 2021 Post author By Tetiana Stoyko Post categories In api-integration, authentication, aws-cognito, aws-cognito-vs-json-web-token, aws-services, json-web-token, user-authentication, user-authorization-methods
Auth in a React App with AWS: How Does It Really Work? Post date August 29, 2021 Post author By Brian H. Hough Post categories In authentication, aws, aws-cognito, cloud-computing, dynamodb, full-stack-development, serverless, user-authentication, web-monetization
How To Integrate Amazon Cognito with Ethereum Blockchain: A Step-by-Step Guide Post date July 1, 2021 Post author By Yi Ai Post categories In aws, aws-cognito, blockchain, dapp, ethereum, hackernoon-top-story, serverless, user-authentication
The HackerNoon Podcast: Let’s Talk About Sec, Baby Post date June 22, 2021 Post author By Amy Tom Post categories In authenticating-identities, authentication, cybersecurity, hackernoon-podcast, hackernoon-top-story, podcast, security, user-authentication
Can You Weave Security Through Low Code Platforms Post date May 13, 2021 Post author By Rosy Post categories In agile-development, agile-software-development, low-code, low-code-approach, low-code-platform, lowcode, software-development, user-authentication
.NET Authentication Security Notes Post date March 30, 2021 Post author By Oleksii Holubiev Post categories In authenticating-identities, authentication, authentication-exploits, cybersecurity, dotnet, dotnet-core, session-management, user-authentication
Learning The Basics Of Identity and Access Management Post date March 20, 2021 Post author By Abeshek_AntWak Post categories In cybersecurity, iam, identity-and-access-management, multifactor-authentication, security, single-sign-on, two-factor-authentication, user-authentication
What is Single Sign-On about? Post date March 5, 2021 Post author By Gururaj Swamy Post categories In authentication, cyber-security-trends, cybersecurity, identity-access, identity-and-access-management, single-sign-on, user-authentication, user-authorization-methods