A Practical Guide to nylas auth scopes
Authentication is the gate between your terminal and your mailbox. nylas auth scopes handles it. The nylas auth scopes command shows which OAuth permi…
Latest AI & ML news from Tech News
Authentication is the gate between your terminal and your mailbox. nylas auth scopes handles it. The nylas auth scopes command shows which OAuth permi…
Need to display current api token? One command. The nylas auth token command prints the active API token or access token for the current grant. Useful…
https://www.youtube.com/watch?v=XeFqLDL4lVA Bearer token. Access token. ID token. Session cookie. OAuth. OIDC. JWT. API key. You open the auth docs an…
You log in to an app. Close the tab. Come back tomorrow. You're still logged in. Convenient? Yes. Also the exact place where most JWT implementations …
I have made the Toqen.app mobile application publicly available. This is a deliberate decision to move toward transparency and independent technical r…
The decisions behind auth are more consequential than most developers realize. In this article we'll cover how token storage works and why the wrong c…
My Auth0 bill last month was $427. For 12,000 monthly active users on a side project that makes roughly $0 in revenue. I spent a Saturday moving off i…
This is day 2 of the series. Yesterday I showed the architecture diagram. Today we are looking at the database that sits underneath it. Every table, e…
I am writing this series because I have built authentication from scratch six times, and every time I got it about 80 percent right and discovered the…
In Part 2 , I had a working REST API with two endpoints. You could create entries and query them. But anyone could hit the API — no login, no tokens, …
Authentication is one of those topics every developer uses—but not everyone truly understands. At some point, you’ll face this decision: 👉 Should I us…
One of the core promises of a platform like smallstack is that it plays well with the rest of your stack. That means: a clean REST API, webhook suppor…
Introduction to SSL/TLS and mTLS Securing HTTP communication is no longer optional—it’s a necessity. At the heart of this security lies SSL/TLS (Secur…
Introduction I perfectly understand how human users authenticate in modern web apps via OAuth 2.0. A browser opens, the user clicks "Allow" on a conse…
Throughout my career as a backend and cloud engineer, I have worked with several database management systems. And while each of them has its own proto…
Prerequisites for all OIDC Providers This guide covers the admin setup for SSO authentication built with Django and AWS Cognito. The full reference im…
Introduction Last time, we tore apart the core mechanics of RFC 6749 (Authorization Code Grant) . RFC 6749 Deep Dive: Understanding OAuth 2.0 Design D…
The right way to authenticate in AWS in 2026. Goodbye access keys, hello temporary credentials. The problem with access keys For years, the "normal" w…