All Projects → gitcommitshow → awesome-authentication

gitcommitshow / awesome-authentication

Licence: MIT license
Resources to learn and implement authentication in your application

Projects that are alternatives of or similar to awesome-authentication

Laravel Resource Links
Add links to Laravel API resources
Stars: ✭ 240 (+106.9%)
Mutual labels:  resources
Awesome
😎 Awesome lists about all kinds of interesting topics
Stars: ✭ 186,540 (+160710.34%)
Mutual labels:  resources
freesources
Repository of free resources for learning Software Development
Stars: ✭ 38 (-67.24%)
Mutual labels:  resources
Free Programming Resources
💎 免费的编程资源大全,持续更新!🔥 覆盖各种语言和方向(Java \ Python \ C++ \ JavaScript \ Golang \ 前端 \ 后端等)的学习路线、贴心教程、项目实战、编程书籍、面试合集、实用资源等,对程序员非常有帮助!
Stars: ✭ 225 (+93.97%)
Mutual labels:  resources
Awesome Gbdev
Contribute
Stars: ✭ 3,016 (+2500%)
Mutual labels:  resources
software-development-resources
Collection of links to great software development resources!
Stars: ✭ 20 (-82.76%)
Mutual labels:  resources
Ketall
Like `kubectl get all`, but get really all resources
Stars: ✭ 233 (+100.86%)
Mutual labels:  resources
UI-UX-Resources
Find all the resources📘📙📕📗 related to UI/UX🎨, Html Templates, Fonts🖋, Icons, Photos Gallery📷, React⚛, Angular🅰, etc.
Stars: ✭ 60 (-48.28%)
Mutual labels:  resources
Front End Checklist
🗂 The perfect Front-End Checklist for modern websites and meticulous developers
Stars: ✭ 57,386 (+49370.69%)
Mutual labels:  resources
Awesome-GRE-Materials
A curated list of materials to prepare for the GRE.
Stars: ✭ 231 (+99.14%)
Mutual labels:  resources
Awesome Javascript Learning
A tiny list limited to the best JavaScript Learning Resources
Stars: ✭ 3,390 (+2822.41%)
Mutual labels:  resources
Studentsatbuild
Find all of the resources you might need to try out code presented in the Student Zone at Build 2020 for yourself!
Stars: ✭ 251 (+116.38%)
Mutual labels:  resources
kubectl-sql
kubectl-sql is a kubectl plugin that use SQL like language to query the Kubernetes cluster manager
Stars: ✭ 50 (-56.9%)
Mutual labels:  resources
Awesome Css Houdini
A curated list of CSS Houdini resources
Stars: ✭ 246 (+112.07%)
Mutual labels:  resources
wtm-udacity-scholars-nanodegree-resources
A List of Resources for Udacity Nanodegrees
Stars: ✭ 15 (-87.07%)
Mutual labels:  resources
Resources
📖 Huge curated collection (archive) of links of Tech, Science, Economics, Politics, Life, Philosophy, Conferences, Videos and much more resources from everyday surfing. ⭐️ Since October 21, 2017.
Stars: ✭ 236 (+103.45%)
Mutual labels:  resources
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+135.34%)
Mutual labels:  resources
awesome-swift-nio
📖 A collaborative list of all things Swift NIO
Stars: ✭ 81 (-30.17%)
Mutual labels:  resources
MySoftwareList
My top picks of software I use everyday. | WIP 🚧
Stars: ✭ 24 (-79.31%)
Mutual labels:  resources
resources
A living collection of resources for participants (and anyone who's interested) in Truffle University's courses 📚
Stars: ✭ 27 (-76.72%)
Mutual labels:  resources

Banner

This is compilation of research on implementing authentication in applications(Covering authentication using JWT for now, more approaches will follow soon)

Fundamentals You Must Know

Cryptography

About Tokens

About Frameworks

Web-Security Recommendations

Secure Key Exchange In Public

Maintaining Forward Secrecy

Invalidating JWT

  • Simply remove the token from the client
  • Create a token blacklist
  • Just keep token expiry times short and rotate them often
  • Contingency Plans : allow the user to change an underlying user lookup ID with their login credentials

A common approach for invalidating tokens when a user changes their password is to sign the token with a hash of their password. Thus if the password changes, any previous tokens automatically fail to verify. You can extend this to logout by including a last-logout-time in the user's record and using a combination of the last-logout-time and password hash to sign the token. This requires a DB lookup each time you need to verify the token signature, but presumably you're looking up the user anyway.

Securtity Risks and Criticism of JWT

Implementations(Examples/Demos)

Useful Tools

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].