Join us live with Advait Ruia (Co-Founder SuperTokens) as we learn about token-based authentication and authorization. Explore the benefits of using tokens over sessions, understand the nuances of short-lived versus long-lived tokens in the AI era, and learn how passkeys integrate with token-based authentication. We'll also discuss the pros and cons of self-implementing token-based authentication, decentralized authentication use cases, and frontend-only authentication. We’ll discuss: - The benefits of using tokens over sessions - What are the new technical use cases that using tokens allows - Short lived vs. long lived tokens - Token and credential theft in the AI era - How passkeys incorporate with token based authentication - Do simple/small applications benefit from tokens? - Is there a reason for self implementation of token based authentication? - Decentralized authentication use cases - Frontend only authentication - How to properly incorporate authorization with tokens - Should people base their authorization on JWTs? - Extensible vs. opinionated auth platforms - Q&A
About us
Full Stack Permissions as a Service Maintainers of Open Policy Admin Layer (OPAL) - https://opal.ac
- Website
-
https://permit.io
External link for Permit.io
- Industry
- Software Development
- Company size
- 11-50 employees
- Type
- Privately Held
- Founded
- 2020
Employees at Permit.io
-
🎩 Baruch Sadogursky
Developer Relations and DPE Advocacy
-
Amir Rustamzadeh
Partner · Firestreak Ventures
-
Gabriel Manor - Liechtman
Engineering Leader | Fullstack Developer | Security, Authorization, DevRel, JavaScript | Writer and Public Speaker
-
Or Weis
Co-Founder / CEO at Permit.io
Updates
-
What should you know about Authorization in Python? 🐍 Authorization is a crucial component of application security, particularly in Python, where extensive frameworks/libraries play a significant role. Here are some best practices for implementing robust authorization in Python applications: Use Declarative Policies Instead of Imperative Statements: Declarative policies define "what" access is allowed rather than "how" it is implemented. This approach separates the authorization policies from the application logic, leading to cleaner and more maintainable code. Keep Your Enforcement Layer Model Agnostic: By abstracting the enforcement layer from specific models, you ensure that changes in the application logic or data model have minimal impact on the authorization policies. Choose a Framework/Language Generic Service: Opting for framework-agnostic services for authorization ensures that your security mechanisms are portable and resilient to changes in the underlying application framework. Always Decouple Policy from Code: Decoupling policy from code enhances flexibility, allowing policy changes without direct modifications to the codebase, which reduces the chances of introducing bugs during updates. Create a Unified Platform for Authorization:A unified platform simplifies management, ensuring consistent enforcement across all components of the application ecosystem. Make Sure Decisions Are Easy to Audit: The ability to audit decisions is essential for troubleshooting, compliance, and security audits. In Practice: Leveraging these best practices in Python can significantly enhance the security and maintainability of your applications. For a deeper dive into implementing these strategies, check out this comprehensive guide: https://lnkd.in/dNHSaqTe
-
Permit.io reposted this
We're thrilled to announce that Permit.io is an official partner this year at the WeAreDevelopers World Congress 2024 🚀 🎟️ Grab your ticket now and get 15% off with the code "WWC_Permit.io15" at worldcongress.dev See you all in Berlin!
-
-
Join us live with Travis Spencer (CEO Curity, Co-founder Nordic APIs) as we dive into the importance of identity security in API security. Explore the latest on OAuth and OpenID in 2024, the impact of GenAI on API security, the differences between machine and human identities, and effective strategies for mapping out API security plans. Discover how fine-grained authorization can enhance APIs and methods to improve authentication experiences. We’ll discuss: - The role of identity security in API security - The state of OAuth and OpenID in 2024 - The challenges and opportunities of GenAI in API security - Machine vs. Human identities - Effective mapping of API security plans - Fine-grained authorization in APIs - Effective methods to improve auth experiences - The Nordic API community - Q&A
API Security Starts with Identity Security
www.linkedin.com
-
Another weekend digest: Explore the process of implementing Role-Based Access Control (RBAC) in applications with policy as code, enhancing security and scalability: https://lnkd.in/eFvZ4xhh
Best Practices to Implement RBAC (Role-Based Access Control) for Developers | Permit
permit.io
-
Short weekend digest: If you've worked on authorization before, you know that sometimes standard policy models like RBAC just aren't enough. What can we do then? Let's find out - https://lnkd.in/eGybRBcM
Beyond RBAC: When standard models just aren’t enough | Permit
permit.io
-
Attribute-Based Access Control (ABAC) and Relationship-Based Access Control (ReBAC) - how do you make the most suitable choice for your application? https://lnkd.in/eRqDUC9U
Conditions vs. Relationships: Choosing Between ABAC and ReBAC | Permit
permit.io
-
Learn how to use GitHub Actions and the CI/CD to proactively protect applications from the first line of code written with Santosh Yadav: https://lnkd.in/eNRztTiJ
How to Use GitHub Actions to Improve Developer Experience and Application Security
https://www.youtube.com/
-
401 vs. 403 Error Codes - What's the Difference? 🤔 And why should you care..? When building and securing web applications, understanding HTTP status codes, especially those related to security, is crucial. Here's a concise breakdown of two common status codes: 401 Unauthorized and 403 Forbidden. ❌ 401 Unauthorized: Essentially a request for the client to authenticate themselves. Meaning: Indicates that the request has not been applied because it lacks valid authentication credentials for the target resource. When to Use: You should return a 401 error when the request lacks credentials or the credentials provided are not valid. This is typically accompanied by a WWW-Authenticate header, which provides information on how to authorize correctly. ❌ 403 Forbidden: Is about authorization, not authentication. Meaning: This status code means that the server understands the request but refuses to authorize it. This is not a matter of insufficient credentials; rather, it's that the authenticated user does not have permission to access the requested resource. When to Use: Use a 403 error when the credentials are valid, but those credentials do not grant permission to perform the requested action. This status is also used in cases where the server does not want to reveal exactly why the request has been refused, or when no other response is applicable. Why It Matters: Proper use of these error codes not only adheres to protocol but also enhances the security and usability of your application by providing clear, actionable feedback to your users. For more detailed examples of how to implement these HTTP status codes correctly, check out this guide: https://lnkd.in/e7rs7AfR
401 vs. 403 Error Codes: What's the Difference? When to Use Each? (Updated 2023) | Permit
permit.io
-
In this video with Filip Grebowski, we delve into a key policy in modern banking systems: "A user can only send a transfer of over £1000 if they have had their account for more than 1 year." Check it out: