Ewan Blog — Stories and Engineering from Ewanbyte
  • Home
  • About
Sign in Subscribe

Security

A complete guide to authentication techniques in backend development.

A complete guide to authentication techniques in backend development.

What are the common Authentication Techniques ? · Basic Authentication · Token Based Authentication · Json Web Token (JWT) · Open authorization...
Sajan N Karki 28 Nov 2025
RBAC vs ABAC Authorization Model

RBAC vs ABAC Authorization Model

Authentication and authorization play a crucial role in preventing security breaches or unauthorized access to either the whole application or certain restricted resource of our application. Authentication checks if the user that is trying to access the application is a valid user or not while authorization controls what the user
Sandesh Bhandari 27 Nov 2025

Subscribe to Ewan Blog — Stories and Engineering from Ewanbyte

Don't miss out on the latest news. Sign up now to get access to the library of members-only articles.
  • Sign up
Ewan Blog — Stories and Engineering from Ewanbyte © 2025. Powered by Ghost