Open in app

Sign In

Write

Sign In

Super Tokens
Super Tokens

94 Followers

Home

About

Published in

HackerNoon.com

·Pinned

The best way to securely manage user sessions

Writer’s edit: I feel like I should thank everyone for the overwhelming positive response — and more than anything, I am glad that this article is useful for the developer community! …

Open Source

7 min read

The best way to securely manage user sessions
The best way to securely manage user sessions
Open Source

7 min read


Aug 31

URI vs URL: The real difference between the two

Table of Content Introduction What is a URL What is a URI What is a URN Conclusion Introduction In the ever-evolving landscape of web development, often times it can be confusing navigating the waters of all the acronyms and technical terms. In this blog we are going to be looking at URL, URI, and…

Uri

2 min read

URI vs URL: The real difference between the two
URI vs URL: The real difference between the two
Uri

2 min read


Aug 31

Understanding JWKS (JSON Web Key Set)

Table of Content Introduction What are JSON Web Keys (JWKS) How do JWKS work? Benefits of using JWKS Considerations for JWKS implementation Conclusion Introduction JWTs or Json Web Tokens play a pivotal role in modern authentication. They are most commonly used to identify authenticated users and validate API requests. Part of this verification process…

Jwks

3 min read

Understanding JWKS (JSON Web Key Set)
Understanding JWKS (JSON Web Key Set)
Jwks

3 min read


Aug 14

Authentication vs Authorization: What’s the difference?

Introduction Although they are often conflated with each other, Authentication and Authorization represent two fundamentally different aspects of security that work together in order to protect sensitive information. In this blog, we will go over some of the key differences between the two. The Foundation — What is Authentication? Authentication is the process of verifying the identity…

Authentication

3 min read

Authentication vs Authorization: What’s the difference?
Authentication vs Authorization: What’s the difference?
Authentication

3 min read


Aug 7

SAML vs OAuth: Choosing the right protocol for authentication

Table of contents Introduction What is SAML and OAuth What are the use cases? Security and mechanisms Conclusion Introduction SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are key protocols for authentication and authorization. While both protocols serve essential purposes, they possess distinct characteristics that make them suitable for specific use cases. …

Authorization

3 min read

SAML vs OAuth: Choosing the right protocol for authentication
SAML vs OAuth: Choosing the right protocol for authentication
Authorization

3 min read


Aug 7

Migrating users without downtime in your service (The Lazy Migration Strategy)

Table of Contents Introduction Real world migration scenarios Our experience of migrating customers over to SuperTokens Understanding Lazy Migration The benefits of Lazy Migration Conclusion Introduction: On the surface, migrating your users from one authentication solution to another seems simple enough. Remove the old authentication logic, integrate with the new authentication provider, and finally…

Migration Strategy

5 min read

Migrating users without downtime in your service (The Lazy Migration Strategy)
Migrating users without downtime in your service (The Lazy Migration Strategy)
Migration Strategy

5 min read


Jun 14

Ory vs Keycloak vs SuperTokens

Table of contents Open-Source Authentication Providers Ory Kratos / Ory Identities Keycloak SuperTokens Choosing an Auth Provider Open-Source Authentication Providers Compared to a couple of years ago, open-source authentication has seen huge progress. In this post, we’ll compare three of the leading open-source authentication providers — Ory, Keycloak, and SuperTokens. Each of these providers has its…

Authentication

6 min read

Ory vs Keycloak vs SuperTokens
Ory vs Keycloak vs SuperTokens
Authentication

6 min read


Mar 9

Django Bootstrap Login Template (How-To)

High Level Refresher Django is a high-level Python framework that follows the model-template-views architectural pattern. Django is one of the most popular web frameworks due to its security, scalability, and flexible design. Companies like Instagram, Reddit, and Dropbox all used Django. Bootstrap is an open-source CSS framework that provides pre-built HTML, CSS, and…

Django

5 min read

Django Bootstrap Login Template (How-To)
Django Bootstrap Login Template (How-To)
Django

5 min read


Feb 27

Implementing the right Email Verification flow

by SuperTokens team Introduction Email verification is contentious, it increases friction and adds yet another step to onboarding. However, when done right, email verification can lead to better communication with users, avoid fake accounts / negative externalities, and maintain high marketing reputation. In this post, we’ll break down why email verification…

Open Source

7 min read

Implementing the right Email Verification flow
Implementing the right Email Verification flow
Open Source

7 min read


Feb 24

A Guide to Implementing Passwordless Login

by SuperTokens Team Introduction Passwordless authentication is becoming an increasingly popular choice for developers. Even notable names like Slack, Notion, and PayPal are all transitioning to SMS, email, or social logins for their authentication.

Authentication

5 min read

A Guide to Implementing Passwordless Login
A Guide to Implementing Passwordless Login
Authentication

5 min read

Super Tokens

Super Tokens

94 Followers

https://supertokens.com

Following
  • David Leangen | Entrepreneur & Software Engineer

    David Leangen | Entrepreneur & Software Engineer

  • Nemi Shah

    Nemi Shah

  • Johan Sydseter

    Johan Sydseter

  • #BlackLivesMatter

    #BlackLivesMatter

  • Vito Baccaro

    Vito Baccaro

See all (9)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams