2024-08-05-TIL
2024-08-05-TIL
Today I Learned
Spring Security Architecture
- https://docs.spring.io/spring-security/reference/servlet/architecture.html
- https://dev-coco.tistory.com/174
- https://medium.com/@rasheed99/introduction-on-spring-security-architecture-eb5d7de75a4f
- https://docs.spring.io/spring-security/reference/servlet/authorization/architecture.html
Authentication vs Authorization
- https://auth0.com/docs/get-started/identity-fundamentals/authentication-and-authorization
- https://baek.dev/post/24/
- https://www.fortinet.com/de/resources/cyberglossary/authentication-vs-authorization#:~:text=Authentication%20is%20verifying%20the%20true,or%20permissions%20in%20a%20system.
Web Application Authentication Best Practices
- https://www.authgear.com/post/web-application-authentication-best-practices
- https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html
- https://stackoverflow.blog/2021/10/06/best-practices-for-authentication-and-authorization-for-rest-apis/
- https://www.permit.io/blog/best-practices-for-api-authentication-and-authorization
- https://goteleport.com/blog/authentication-best-practices/
- https://www.baeldung.com/cs/authentication-web-apps
- https://www.linkedin.com/advice/1/what-best-practices-securing-your-authentication
- https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/
- https://frontegg.com/blog/authentication#JSON-Web-Token-(JWT)
- https://www.techtarget.com/searchsecurity/tip/Use-these-6-user-authentication-types-to-secure-networks
- https://www.strongdm.com/blog/authentication-methods
- https://cloud.google.com/docs/authentication?hl=ko
- https://www.freecodecamp.org/news/user-authentication-methods-explained/
JWT Authentication Best Practices
- https://curity.io/resources/learn/jwt-best-practices/
- https://blog.logrocket.com/jwt-authentication-best-practices/
- https://medium.com/@darshana-edirisinghe/jwt-security-concerns-f79e63ff4871
Logging Best Practices
- https://betterstack.com/community/guides/logging/logging-best-practices/
- https://newrelic.com/blog/best-practices/best-log-management-practices
- https://www.dataset.com/blog/the-10-commandments-of-logging/
This post is licensed under CC BY 4.0 by the author.