/ posts/ 7
Rewind a decade or so, and you’d find me ensconced within the embrace of a Linux terminal for the duration of my day. Here, amidst the digital ebb and flow, I thrived—maneuvering files and folders…
Hey there!
Hi there!
I have Django/Vue development environment running locally.
Greetings to all you geeks out there!
JSON Web Tokens (JWTs) play a crucial role in web application security. In this blog, we walkthrough the concept of JWT, focusing on the different types of claims, the structure of a JWT, and the…
The OAuth 2.0 authorization code flow is a secure and widely adopted method for obtaining access tokens to access user resources on behalf of the user.
Below is a table summarizing the different grant types in OAuth 2.0 along with brief descriptions and recommendations regarding their use: