Skip to content

Commit 1959a0b

Browse files
Merge pull request #2138 from LoginRadius/develop
Develop
2 parents 5f53e0a + 04bb27c commit 1959a0b

24 files changed

Lines changed: 311 additions & 22 deletions

File tree

content/engineering/Nodejs-and-MongoDb-application-authentication-by-JWT/index.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -298,8 +298,6 @@ Step 11. Then, enter the parameters for the key and value for fetching the profi
298298

299299
As we have seen it is fairly easy to build a JWT authentication system with NodeJS, You can found the complete code used in this tutorial [here](https://github.com/LoginRadius/engineering-blog-samples/tree/master/NodeJs/JwtAuthentication).
300300

301-
**Note : You can decode or verify your JWT token details with this [tool](https://jwt.io/)**
302-
303301

304302

305303

content/engineering/guest-post/what-are-jwt-jws-jwe-jwk-jwa/index.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,6 @@ OpOSSw7e485LOP5PrzScxHb7SR6sAOMRckfFwi4rp7o ----------------> OpOSSw7e485LOP5P
5858

5959
This shows the decoded JSON Web Token. In the deserialized form, JWT contains only the header and the payload as plain JSON objects.
6060

61-
JWT is implemented using JWS or JWE. Learn more about JWT [here](https://jwt.io/)
62-
6361
## JWS — JSON Web Signature
6462

6563
JWS is used to represent content secured with digital signatures or Hash-based Message Authentication Codes (HMACs) with the help of JSON data structures. It cryptographically secures a JWS Header and JWS Payload with a JWS Signature. The encoded strings of these three are concatenated using dots similar to JWT. The identifiers and algorithms used are specified in the JSON Web Algorithms specification.

content/engineering/implementing-authentication-on-vuejs-using-jwt/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@ app.post("/login", (req, res) => {
241241
It is the user object we want to sign, so when you send it to the client. We can uniquely identify them. The unique ID is also very important because when a server gets a request with a token, we want to know what uniquely identifies the request.
242242
Now when we enter the username and password in our form, we can see in the console that our JWT token is generated but is not encrypted.
243243
244-
You can visit this site [jwt.io](https://jwt.io/) and paste in the token that was generated, and your token will be decoded and return information about your payload
244+
You can visit jwt.io and paste in the token that was generated, and your token will be decoded and return information about your payload
245245
246246
*Note: The token is not encrypted, and anyone who gets access to the token can hit your server with it. Tokens normally have an expiry period of between 30 - 60 minutes*
247247

content/engineering/jamstack-introduction/index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,10 +80,9 @@ In a JAMStack architecture, however, the frontend and backend are decoupled. A f
8080
A JAMStack backend is a content API that returns JSON/XML. This API can be a hosted datastore, a headless CMS, serverless functions, or a custom application.
8181
## Useful resources
8282

83-
- [JAMstack WTF](https://jamstack.wtf/)
8483
- [Awesome JAMstack](https://github.com/automata/awesome-jamstack)
8584
- [JAMstack Community Slack](https://jamstack.slack.com/join/shared_invite/enQtNjc4OTI1NDk3NDI1LWIxZjk1YWRjOWVlMzM0MTVlMTg4YmY1OTBjZDc1M2I3N2NhODBlZDNmNjAzMGMwNzI5MTVlMWEwYjBiMTU2NzE)
8685
- [JAMstack on CSS-Tricks](https://css-tricks.com/tag/jamstack/)
8786
- [JAMstack_conf](https://jamstackconf.com/)
8887
- [JAMstack Radio](https://www.heavybit.com/library/podcasts/jamstack-radio/)
89-
- JAMstack examples
88+

content/engineering/jwt/index.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,8 +131,6 @@ CJqdGkiOiI0YjVmY2VhNi0yYTVlLTRhOWQtOTdmMi0zZDg2MzFlYTJjNWEiLCJpYXQiOjE1MjExOTE5M
131131

132132
This is our final JWT, containing the Header, Payload, and Signature joined together with dots. It can be passed as a URL parameter, a POST parameter, or in the  HTTP header to authenticate or exchange information.
133133

134-
You can play around with JWT using our [JWT SSO Tool.](https://jwt.io/)
135-
136134
Note: JWT does not hide information; it just encodes information using the digitally-signed signature and verifies that the information has not been altered over the network. So, do not add any sensitive information in the JWT claim.
137135

138136
**Conclusion**

content/growth/Hotjar-vs-Microsoft-Clarity/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ More than 50 heatmap tools are available on the internet, and Hotjar often featu
9999

100100

101101

102-
According to statistics, more than [900,000 enterprises](https://techairgroup.com/hotjar-microsoft-clarity-heatmaps/#:~:text=MS%20Clarity%20offers%20heatmaps%20for,excessive%20scrolling%2C%20and%20JavaScript%20errors.) spread across 180 countries [](https://techairgroup.com/hotjar-microsoft-clarity-heatmaps/#:~:text=MS%20Clarity%20offers%20heatmaps%20for,excessive%20scrolling%2C%20and%20JavaScript%20errors.) use Hotjar to prepare heatmaps to track website visitors’ activity.
102+
According to statistics, more than [900,000 enterprises](https://techairgroup.com/hotjar-microsoft-clarity-heatmaps/) spread across 180 countries use Hotjar to prepare heatmaps to track website visitors’ activity.
103103

104104

105105

content/growth/how-to-use-identity-marketing-privacy-centric-world/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ Once marketers have a good understanding of these factors, they can begin develo
5353

5454
The answer is yes! [User management](https://www.loginradius.com/user-management/) “can'' contribute to identity marketing and in several ways. First, it can help you manage and track the interactions your customers have with your brand. This information can be used to improve customer retention rates and understand how best to serve them.
5555

56-
Second,[ ](https://www.loginradius.com/user-management/)user management can help you identify and segment your target market. You can create targeted ads that are more relevant to your customers. By understanding their interests and preferences, you can create ads that are more likely to convert.
56+
Second, user management can help you identify and segment your target market. You can create targeted ads that are more relevant to your customers. By understanding their interests and preferences, you can create ads that are more likely to convert.
5757

58-
Third,[ ](https://www.loginradius.com/user-management/)user management can help you determine which users are likely to churn or abandon your product or service. This information can be used to develop strategies that prevent these users from leaving your product or service.
58+
Third, user management can help you determine which users are likely to churn or abandon your product or service. This information can be used to develop strategies that prevent these users from leaving your product or service.
5959

6060

6161
## Scalar Utilization is Also Effective

content/growth/improving-customer-experience-in-the-gaming-industry/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ In short, the more invested the player is in the experience, the more upset they
8787

8888
Compared to TV, music, and film, the gaming industry is becoming one of the biggest industries in digital entertainment. In order to play their favorite games, players trust gaming companies with their personal information. 
8989

90-
That’s why [data security](https://www.cpomagazine.com/tech/data-security-in-the-online-gaming-industry/) should be taken seriously. Here are the most common gaming security issues and how to remedy them.
90+
That’s why data security should be taken seriously. Here are the most common gaming security issues and how to remedy them.
9191

9292
- **Weak authentication:** An average gamer needs to manage multiple accounts for multiple games. This means that players must remember multiple passwords for all of these games. As a result, they end up with weaker passwords or reusing the same password for multiple accounts. This, of course, makes hacking a gamer’s account “child’s play.”
9393

content/growth/test-cases-for-your-e-commerce-payment-gateway-page/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ As you have known the basics about payment gateway, let me tell you what aspects
3333

3434
- **Security:-**   It is one of the most important aspects while testing a payment gateway. Other than buffer overruns, one needs to take care of other troubling security threats. Some of the resources you can take help from while testing security on payment gateway are [OWASP Top 10](https://www.owasp.org/index.php/Top_10_2013-Top_10), [Web Blog by Michael Howard](https://blogs.msdn.microsoft.com/michael_howard/) and [Google Online Security Blog](https://security.googleblog.com/).
3535

36-
- **Performance:-** Performance is another KPI for your payment gateway. Hence, you should make sure about things like number of users your payment gateway page can handle, number of users who are simultaneously using your page. Some of the resources you can refer are [Smartbear’s Performance Testing Resource](https://smartbear.com/learn/performance-testing/) and [guru99](https://www.guru99.com/performance-testing.html) articles.
36+
- **Performance:-** Performance is another KPI for your payment gateway. Hence, you should make sure about things like number of users your payment gateway page can handle, number of users who are simultaneously using your page. One of the resources you can refer is [guru99](https://www.guru99.com/performance-testing.html) articles.
3737

3838
### **Checklists While Preparing Test Cases For Payment Gateway**
3939

content/growth/top-3-ciam-indicators/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,6 @@ Businesses need to understand the true potential of a CIAM solution. A reliable
100100

101101
The aspects above depict the role and responsibilities of a robust CIAM that can guarantee consumer trust and help scale business growth.
102102

103-
If you wish to experience the ease of consumer onboarding that increases consumer satisfaction and boosts your business revenues, it’s time to [](https://www.loginradius.com/book-a-demo/) [experience the LoginRadius CIAM](https://www.loginradius.com/contact-sales/).
103+
If you wish to experience the ease of consumer onboarding that increases consumer satisfaction and boosts your business revenues, it’s time to [experience the LoginRadius CIAM](https://www.loginradius.com/contact-sales/).
104104

105105
[![book-a-demo-Consultation](../../assets/book-a-demo-loginradius.png)](https://www.loginradius.com/book-a-demo/)

0 commit comments

Comments
 (0)