Twitter
youtube
Discord
Contact us
Forums
New posts
Trending
Rules
Explore
Bioenergetic Wiki
Bioenergetic Life Search
Bioprovement Peat Search
Ray Peat Interviews by Danny Roddy
Master List: Ray Peat, PhD Interviews & Quotes by FPS
Traveling Resources
Google Flights
Wiki Voyage
DeepL Translator
Niche
Numbeo
Merch
Log in
Register
What's new
Search
Search
Search engine:
Threadloom Search
XenForo Search
Search titles only
By:
New posts
Trending
Menu
Log in
Register
Navigation
Install the app
Install
More options
Light/Dark Mode
Contact us
Close Menu
Information
World News
Show HN: Open Source Authentication and Authorization
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Hacker News" data-source="post: 73690" data-attributes="member: 365"><p>I’m Rishabh and the co-founder and CTO at <a href="https://supertokens.com" target="_blank">https://supertokens.com</a> (YC S20). We offer open-source user authentication and we just released our user roles product for companies implementing authorization.</p><p>Our users are web developers, and a prominent and adjacent pain point for our users is authorization. Developers typically implement two independent solutions for authentication and authorization. Offering AuthN and AuthZ in a single solution is something we’ve been thinking about for the last few years.</p><p>Quick primer, authentication is knowing who the user is, and authorization is knowing what the user has access to. A physical analogy: A person enters a building. Authentication means reading their ID card and knowing that the person’s name is John. Authorization means knowing which floors, offices, and files John has access to.</p><p>With increasing privacy and data complexity, companies like Netflix[1], Slack[2], and Airbnb[3] have built out their own complex authorization systems.</p><p>To build our user roles product, we started with a first principles approach of covering authorization use cases using scripting languages such as XACML and OPA. But looking at existing solutions built by talented teams like Oso[4], Aserto[5], Cerbos[6], Strya[7], we realized that while these were powerful solutions, they were often overkill for most early to mid-stage companies (especially on the B2C side).</p><p>We went back to the drawing board, reached out to our users and after dozens of conversations, we realized that most authorization needs require the ability to</p><p>1. Assign and manage roles and permissions</p><p>2. Store roles in the DB and session tokens to make it readable on the frontend and</p><p>3. Protect APIs and websites based on these roles and permissions.</p><p>And so, we built user roles – a simple RBAC authorization service that focuses on the balance between simplicity and utility. It doesn’t cover many complex cases and we’re not looking to displace any of the authorization incumbents. But you can add AuthN and AuthZ using a single solution, quickly.</p><p>In the near future, we’ll be launching an admin GUI where you can manage your users and their roles with a few clicks.</p><p>We’d love for you to try it out and hear what additional functionality you’d like to see. What are your favorite authentication providers and what do they get right?</p><p>- [1]: <a href="https://conferences.oreilly.com/velocity/vl-ca-2018/cdn.oreillystatic.com/en/assets/1/event/270/The%20distributed%20authorization%20system_%20A%20Netflix%20case%20study%20Presentation.pdf" target="_blank">https://conferences.oreilly.com/velocity/vl-ca-2018/cdn.orei...</a></p><p>- [2]: <a href="https://slack.engineering/role-management-at-slack/" target="_blank">https://slack.engineering/role-management-at-slack/</a></p><p>- [3]: <a href="https://medium.com/airbnb-engineering/himeji-a-scalable-centralized-system-for-authorization-at-airbnb-341664924574" target="_blank">https://medium.com/airbnb-engineering/himeji-a-scalable-cent...</a></p><p>- [4]: <a href="https://www.osohq.com/" target="_blank">https://www.osohq.com/</a></p><p>- [5]: <a href="https://www.aserto.com/" target="_blank">https://www.aserto.com/</a></p><p>- [6]: <a href="https://cerbos.dev/" target="_blank">https://cerbos.dev/</a></p><p>- [7]: <a href="https://www.styra.com/" target="_blank">https://www.styra.com/</a></p><p></p><hr /><p></p><p>Comments URL: <a href="https://news.ycombinator.com/item?id=33450860" target="_blank">https://news.ycombinator.com/item?id=33450860</a></p><p></p><p>Points: 7</p><p></p><p># Comments: 0</p><p></p><p><a href="https://news.ycombinator.com/item?id=33450860" target="_blank">Continue reading...</a></p></blockquote><p></p>
[QUOTE="Hacker News, post: 73690, member: 365"] I’m Rishabh and the co-founder and CTO at [URL]https://supertokens.com[/URL] (YC S20). We offer open-source user authentication and we just released our user roles product for companies implementing authorization. Our users are web developers, and a prominent and adjacent pain point for our users is authorization. Developers typically implement two independent solutions for authentication and authorization. Offering AuthN and AuthZ in a single solution is something we’ve been thinking about for the last few years. Quick primer, authentication is knowing who the user is, and authorization is knowing what the user has access to. A physical analogy: A person enters a building. Authentication means reading their ID card and knowing that the person’s name is John. Authorization means knowing which floors, offices, and files John has access to. With increasing privacy and data complexity, companies like Netflix[1], Slack[2], and Airbnb[3] have built out their own complex authorization systems. To build our user roles product, we started with a first principles approach of covering authorization use cases using scripting languages such as XACML and OPA. But looking at existing solutions built by talented teams like Oso[4], Aserto[5], Cerbos[6], Strya[7], we realized that while these were powerful solutions, they were often overkill for most early to mid-stage companies (especially on the B2C side). We went back to the drawing board, reached out to our users and after dozens of conversations, we realized that most authorization needs require the ability to 1. Assign and manage roles and permissions 2. Store roles in the DB and session tokens to make it readable on the frontend and 3. Protect APIs and websites based on these roles and permissions. And so, we built user roles – a simple RBAC authorization service that focuses on the balance between simplicity and utility. It doesn’t cover many complex cases and we’re not looking to displace any of the authorization incumbents. But you can add AuthN and AuthZ using a single solution, quickly. In the near future, we’ll be launching an admin GUI where you can manage your users and their roles with a few clicks. We’d love for you to try it out and hear what additional functionality you’d like to see. What are your favorite authentication providers and what do they get right? - [1]: [URL='https://conferences.oreilly.com/velocity/vl-ca-2018/cdn.oreillystatic.com/en/assets/1/event/270/The%20distributed%20authorization%20system_%20A%20Netflix%20case%20study%20Presentation.pdf']https://conferences.oreilly.com/velocity/vl-ca-2018/cdn.orei...[/URL] - [2]: [URL]https://slack.engineering/role-management-at-slack/[/URL] - [3]: [URL='https://medium.com/airbnb-engineering/himeji-a-scalable-centralized-system-for-authorization-at-airbnb-341664924574']https://medium.com/airbnb-engineering/himeji-a-scalable-cent...[/URL] - [4]: [URL]https://www.osohq.com/[/URL] - [5]: [URL]https://www.aserto.com/[/URL] - [6]: [URL]https://cerbos.dev/[/URL] - [7]: [URL]https://www.styra.com/[/URL] [HR][/HR] Comments URL: [URL]https://news.ycombinator.com/item?id=33450860[/URL] Points: 7 # Comments: 0 [url="https://news.ycombinator.com/item?id=33450860"]Continue reading...[/url] [/QUOTE]
Loading…
Insert quotes…
Verification
Post reply
Information
World News
Show HN: Open Source Authentication and Authorization
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top