#authorization

[ follow ]
Software development
fromMedium
1 week ago

OWASP Top 10 for Appliction Programming Interfaces

APIs enable modular, scalable software but exposed endpoints and misconfigurations create critical vulnerabilities like broken authorization and authentication leading to data breaches.
Growth hacking
fromHackernoon
2 years ago

The 5 Most Common MessagingSDK Vulnerabilities (and How to FixThem) | HackerNoon

Multi-tenant messaging systems risk authorization errors; proper token security is essential.
Ruby on Rails
fromAmazon Web Services
3 months ago

Secure your Express application APIs in minutes with Amazon Verified Permissions | Amazon Web Services

Amazon Verified Permissions introduces a new open-source package that simplifies external fine-grained authorization for Express.js applications, enhancing security and reducing code complexity.
DevOps
fromDevOps.com
4 months ago

Simplifying Authorization at Scale: The Importance of DevOps Workflows with Flexible, Scalable and Secure Access Control - DevOps.com

Modern DevOps practices require an evolved approach to authorization, moving away from legacy systems to scalable, automated solutions.
fromRubyflow
4 months ago

Rabarber v5: Cleaner, Leaner, and More Stable

Rabarber version 5 emphasizes simplifying and cleaning up the gem by dropping legacy features that added complexity. This aligns, fundamentally, with its intended purpose.
European startups
fromHackernoon
2 years ago

Meet Cerbos, Winner of Startups of The Year 2024 in Access Control | HackerNoon

Cerbos simplifies and externalizes authorization management, enhancing security and efficiency in software development.
fromInfoQ
5 months ago

Addressing Kubernetes Authorization with Cedar

Cedar simplifies Kubernetes authorization challenges by enabling fine-grained permissions and integrates seamlessly with existing RBAC configurations for gradual adoption.
Privacy professionals
Privacy professionals
fromHackernoon
1 year ago

How SaaS Companies are Changing Their Approach to Authorization | HackerNoon

Authorization defines user access to data and is often complex and challenging to maintain.
Emergence of tools like Oso is revolutionizing how developers manage authorization.
[ Load more ]