authorization



Facebook OAuth2.0 access for web application

  • avatar
  • 6.3K Views
  • 9 Likes
  • 12 mins read
Preview post image

Facebook is very popular social network with millions of users worldwide and the number of active Facebook users growing day by day. Their platform allows third party websites to use Facebook as registration or login option with just a few clicks. That is the social login and it allows customers to bring their existing social identities and use them to register and log in without creating a new account explicitly. It saves a lot of time for users and makes the life easier as we don't need to remember all those credentials for different websites anymore.

GitLab OAuth2.0 access for web application

  • avatar
  • 5.0K Views
  • 2 Likes
  • 7 mins read
Preview post image

GitLab is one of fastest growing private software companies. The company provides a central server that manages git repositories and is used to simplify the administration tasks of many corporations worldwide. Their platform allows third party websites to use GitLab as registration or login option with just a few clicks. That is the social login and it allows customers to bring their existing social identities and use them to register and log in without creating a new account explicitly. It saves a lot of time for users and makes the life easier as we don't need to remember all those credentials for different websites anymore.

Google OAuth 2.0 access for server side web apps

  • avatar
  • 4.0K Views
  • 5 Likes
  • 12 mins read
Preview post image

Google is a popular platform that is commonly used on websites as registration or login option. It allows us to register with our Google account with just a few clicks and skip the process of email validation. It saves us a lot of time and makes the life easier as we don't need to remember all those credentials for different websites anymore.

 Join Our Monthly Newsletter

Get the latest news and popular articles to your inbox every month

We never send SPAM nor unsolicited emails

BitBucket OAuth2.0 access for web application

  • avatar
  • 3.7K Views
  • 3 Likes
  • 8 mins read
Preview post image

Bitbucket is git repository management solution designed for professional teams. It gives you a central place to manage git repositories, collaborate on your source code and guide you through the development flow. Their platform allows third party websites to use BitBucket as registration or login option with just a few clicks. That is the social login and it allows customers to bring their existing social identities and use them to register and log in without creating a new account explicitly. It saves a lot of time for users and makes the life easier as we don't need to remember all those credentials for different websites anymore.

How to install MongoDB 6 on Ubuntu 20.04

  • avatar
  • 2.2K Views
  • 2 Likes
  • 6 mins read
Preview post image

MongoDB is a popular open source and document oriented database system. It belongs to a family of databases called NoSQL, which is different from the traditional table based SQL databases. It makes use of collections, each having multiple documents, and allows the user to store data in a non relational format. Data is stored in flexible, JSON-like documents where fields can vary from document to document. That's the reason for calling it schemaless database.

Understanding OAuth 2.0 and how it works

  • avatar
  • 1.9K Views
  • 6 Likes
  • 4 mins read
Preview post image

OAuth is an open authorization protocol, which allows accessing the resources of the resource owner by enabling the client applications on HTTP services such as Google, Facebook, Twitter, GitHub, BitBucket, and a long etc... It allows sharing of resources stored on one site to another site without using user credentials. Username and password tokens are used instead. The access to the resource can be limited by defined and approved scope.

How to install MongoDB 5 on Ubuntu 20.04

  • avatar
  • 1.8K Views
  • 12 Likes
  • 6 mins read
Preview post image

MongoDB is one of the popular open source and document oriented database systems. It belongs to a family of databases called NoSQL, which is different from the traditional table based SQL databases. It makes use of collections, each having multiple documents, and allows the user to store data in a non relational format. Data is stored in flexible, JSON-like documents where fields can vary from document to document.

Connecting to remote server using SSH

  • avatar
  • 2.0K Views
  • 1 Like
  • 6 mins read
Preview post image

Secure Shell (SSH) is a protocol that provides secure command-line access to a remote server. By using SSH, you can remotely log in and run commands as if you were sitting right at the server.

The benefit of using SSH over other methods of remote access is that, as the name suggests, communications are securely encrypted, protecting the traffic flowing to and from the server. Data is encrypted at both ends of the client/server connection using a digital security certificate and access credentials are also protected.

GitHub OAuth2.0 access for web application

  • avatar
  • 1.5K Views
  • 2 Likes
  • 7 mins read
Preview post image

GitHub is one of the most popular platforms for developers. Millions of developers and companies build, ship, and maintain their software on GitHub. Their platform allows third party websites to use GitHub as registration or login option with just a few clicks. That is the social login and it allows customers to bring their existing social identities and use them to register and log in without creating a new account explicitly. It saves a lot of time for users and makes the life easier as we don't need to remember all those credentials for different websites anymore.

Popular authentication methods for Applications

  • avatar
  • 920 Views
  • 8 mins read
Preview post image

Robust authentication methods are essential for securing access to sensitive information and resources within applications. Authentication serves as the initial barrier, ensuring only authorized users gain entry to protected areas. From traditional password-based authentication to advanced token-based systems and OAuth protocols, developers have a range of options to ensure the security of their applications. This article explores these authentication methods, highlighting their strengths, weaknesses, and best practices to assist developers in implementing secure and user-friendly authentication systems.