caduh

Posts tagged “security

Tiny explainers grouped by topic. Spend less time Googling, more time building.

CORS Explained Without Cargo Culting

A practical guide to CORS for builders: origins, preflights, credentials, common browser errors, and the server configs that actually fix them without opening your API to the world.

devsecurityweb

Secrets Management 101

A practical guide to env vars, secret managers, rotation, and least privilege — with delivery patterns for web apps, workers, CI/CD, and Kubernetes.

devsecuritysecrets

CSRF Still Matters

A practical guide to CSRF protection in modern apps: SameSite cookies, synchronizer tokens, custom headers, Fetch Metadata, and the CORS mistakes that quietly reopen old holes.

devsecuritycsrf

RBAC vs ABAC vs ReBAC

A practical guide to choosing role-based, attribute-based, or relationship-based authorization for real products, with examples for SaaS apps, internal tools, B2B org models, and shared resources.

devauthauthorization

Passkeys / WebAuthn in Practice

A practical guide to shipping passkeys with WebAuthn: registration, sign-in, recovery, account settings, and the RP ID/origin gotchas that usually break rollouts.

devauthpasskeys

Session Cookies vs JWTs vs PASETO

A practical guide to choosing session cookies, JWTs, or PASETO for web apps, SPAs, mobile apps, and APIs without cargo-culting stateless auth.

devauthsecurity

OAuth 2.1 & OpenID Connect, Explained for Builders

A practical guide to OAuth 2.1 and OpenID Connect for real apps: authorization code + PKCE, refresh tokens, ID tokens, and machine-to-machine flows without the usual auth confusion.

devauthoauth

JWTs — Expiration, Rotation, and Revocation

Design access + refresh flows that are safe: short-lived access tokens, rotating refresh tokens with reuse detection, device-scoped sessions, and practical revocation strategies.

devsecurityauth

Securely Managing Environment Variables (The Right Way)

Why you shouldn’t commit .env files, how to handle secrets differently in local, staging, and production, and the exact patterns to inject, validate, rotate, and audit configuration safely.

devsecuritysecrets