The 8 tables behind a real auth system (Postgres schema, explained column by column)
This is day 2 of the series. Yesterday I showed the architecture diagram. Today we are looking at the database that sits underneath it. Every table, e…
Latest Architecture news from Tech News
This is day 2 of the series. Yesterday I showed the architecture diagram. Today we are looking at the database that sits underneath it. Every table, e…
I am writing this series because I have built authentication from scratch six times, and every time I got it about 80 percent right and discovered the…
Authentication is one of those topics every developer uses—but not everyone truly understands. At some point, you’ll face this decision: 👉 Should I us…
Introduction I perfectly understand how human users authenticate in modern web apps via OAuth 2.0. A browser opens, the user clicks "Allow" on a conse…
Throughout my career as a backend and cloud engineer, I have worked with several database management systems. And while each of them has its own proto…