Gabriel L. Manor & Daniel Bass
What is Fine Grained Authorization (FGA)?
Learn how Fine Grained Authorization (FGA) can enhance your application's security and provide precise, dynamic permissions.
Gabriel L. Manor & Daniel Bass
Learn how Fine Grained Authorization (FGA) can enhance your application's security and provide precise, dynamic permissions.
Daniel Bass
See how Maricopa County used Fine-Grained Authorization (FGA) to secure its voting system. A case study for developers protecting data in large-scale operations
Daniel Bass
Explore token-based authentication, its advantages over sessions, various token types, and the role of authorization tokens in security.
Gabriel L. Manor
Top 5 trends in access control for 2024: passkey authentication, fine-grained authorization, policy as code, and more. Get ready to secure your application.
Gabriel L. Manor
Everything you need to know on the principles of authentication and authorization in applications. Including a comparison table and real-world use cases.
Gabriel L. Manor
Learn best practices for implementing ABAC (Attribute-Based Access Control) in application authorization, including real-world use cases and code examples.
Gabriel L. Manor
Attribute Based Access Control (ABAC) is an authorization model that grants access based on environmental conditions, as well as user and resource attributes. Learn how ABAC works, its use cases, and how to implement it in your application
Gabriel L. Manor
Discover top open-source auth projects enhancing application security, including Hanko, Supabase, and OPAL, for robust authentication and authorization.
Daniel Bass
How Google built its access control with Google Zanzibar, and how you can model and build a 'Google Drive' style authorization system for your app yourself!
Daniel Bass
Learn how to implement proper authorization for a healthcare app with the help of Galactic Health Corporation - a Rick & Morty inspired healthcare application.
Daniel Bass
Protecting your user's personal medical information is vital in healthcare apps. Here's how to make sure you're doing everything to keep that data safe -
Daniel Bass
Learn how, when, and where to use OAuth scopes for authorization. Get a clear understanding of OAuth scopes definition and their proper usage.
Gabriel L. Manor
Learn how to use passkeys and fine-grained authorization for better access control in cloud applications, including an example project and a detailed tutorial.
Daniel Bass
Get ready to rumble! Join us on a quest to find the best authorization policy model in an epic battle royale: RBAC vs. ABAC vs. ReBAC