Auth Academy
Welcome to the Authress Auth Academy.
Here is a catalog of articles ranging from introductory to advanced in the areas of Authentication and Authorization. You'll be able to learn everything there is to know about Auth through these easy to follow articles in the Authress Academy.
If you are looking for implementating Authress instead, check out the Document Knowledge Base.
๐๏ธ Choosing the best access control strategy
A comparison of different access control strategies such as role-based access control (RBAC) and others.
๐๏ธ How does machine to machine authentication work?
Machine to machine auth is how you ensure secure communication between individual services, and each service can authorize others to access protected resources.
๐๏ธ Denylists and Invaliding user access
Learn how to securely log a user out, revoke or invalidate the current access, and support denylists in your application for OAuth JWTs
๐๏ธ Scoping and Attenuating Tokens
What is permission attenuation and how to deal with potentially untrusted environments.