blog.asayer.io
JWT Authentication Best Practices
13+ min · · The thing not everyone considers when writing microservices though is that they require a way for you to authenticate against them. Both if you’re using a front-end client or just communicating with… · Shared by 13, including Marius Bleuer
keycloak.org
Open Source Identity and Access Management
1 min · · Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced… · Shared by 7, including Marius Bleuer