An analysis of the Keycloak authentication system(humanativaspa.it) Earlier this year, I was working with my colleague Ema on a source-assisted application and architecture assessment for a client who was using Keycloak to implement single sign-on on their applications.
Pushed Authorization Requests (Par) in Asp.net Core 9(nestenius.se) ASP.NET Core 9 introduces support for Pushed Authorization Requests (PAR) in its OpenIdConnect authentication handler. But what exactly is PAR, and why does it matter? In this post, I’ll explain what PAR is, how it works, how to use it with Duende IdentityServer, and when you should consider using it in your applications.
Auth Wiki(auth.wiki) Explore and find clear definitions of key glossaries related to authentication, authorization, and identity management. Work with open-standards like OpenID Connect, OAuth 2.0, and SAML.
The War on Passwords Is One Step Closer to Being Over(wired.com) “Passkeys,” the secure authentication mechanism built to replace passwords, are getting more portable and easier for organizations to implement thanks to new initiatives the FIDO Alliance announced on Monday.
New passkey specifications will let users import and export them(9to5mac.com) Passkeys were introduced two years ago, and they replace traditional passwords with more secure authentication using a security key or biometrics. To make the technology even better, the FIDO Alliance published on Monday new specifications for passkeys, which ensure a way to let users import and export them.
Coming soon: Securely import and export passkeys(1password.com) Passkeys are superior to passwords in almost every way. They’re simpler to use because there’s nothing to memorize, type out, or paste in. They’re also always strong and come with multi-factor authentication built right in. In short, passkeys are awesome.
FortiLock: The Future of Unhackable Authentication(ycombinator.com) Hey there, tech enthusiasts and security pros! Ready to explore the future of secure logins? We’re proud to introduce FortiLock, an innovative, next-level authentication system designed to keep your credentials safe even in a world full of threats.
The Copenhagen Book: general guideline on implementing auth in web applications(thecopenhagenbook.com) The Copenhagen Book provides a general guideline on implementing auth in web applications. It is free, open-source, and community-maintained. It may be opinionated or incomplete at times but we hope this fills a certain void in online resources. We recommend using this alongside the OWASP Cheat Sheet Series.
Ask HN: What type of Auth are you using on your side projects?(ycombinator.com) I was looking at the Supabase docs and it was nice to see a long list of Auth work flows supported/documented. So my question is, here in October 2024, what are y'all using for Auth on your side projects. Password based, social, email, something else?
72 points by khanmitdoit 54 days ago | 44 comments
SAML: A Technical Primer(ssoready.com) SAML is a source of a lot of confusion for developers. This article is a technical primer on some of the most common questions engineers and other technical folks have about SAML:
The "email is authentication" pattern(rubenerd.com) I’m the first to admit that I don’t live in the real (electronic) world. As the late Jim Kloss pointed out during one of his broadcasts, we (and probably you) live in a part of the Web with ad blockers (as the [FBI recommends](https://www.ic3.gov/Media/Y2022/PSA221221)), limited JavaScript, password managers, and a (mostly) finely-tuned sense of what is a scam and what is legitimate (that was a lot of brackets).