Auth Does NOT Have To Be Hard

Sdílet
Vložit
  • čas přidán 7. 09. 2024

Komentáře • 141

  • @DodaGarcia
    @DodaGarcia Před rokem +23

    I love the positivity with which you explain these concepts! The love you clearly have for dev and coding makes the topics a lot easier to follow and makes your videos a joy to watch.

  • @marcin6569
    @marcin6569 Před rokem +12

    Best teacher on the web. Great choice and variety of topics. Thanks!

  • @waynebro7828
    @waynebro7828 Před rokem +1

    today in the interview a question was asked about implementing auth in the app, and I mumble hard.
    I open youtube and my man kyle upload this, thanks bro you are god send

  • @michelaveline
    @michelaveline Před rokem +16

    One, among many, incredibly useful video.

  • @ylsv
    @ylsv Před rokem +2

    Do not delete wds, please) too much useful and up to date info, here. Thank you)

  • @capability-snob
    @capability-snob Před rokem +2

    Auth gets even simpler if you don't tie it to subjects (that is, users). C.f. Webkeys for an example of doing capabilities over the web.

  • @wlancer8826
    @wlancer8826 Před rokem +1

    You can always make complex things so clear!Can you also make a video about all the tabs in the inspector? I'm always confused.. ex. performance, memory, security, etc

  • @hollowmoose
    @hollowmoose Před rokem +4

    Perfect! I'm currently working on auth for my web app

  • @kenneth6965
    @kenneth6965 Před rokem +4

    I want to thank, you, Kevin Powell, Ania Kubow and Patrick God for the insane influence in my career you guys have.

  • @avi12
    @avi12 Před rokem +1

    What a crazy coincidence, yesterday I was looking for a video about an authentication tutorial

  • @oxynetz
    @oxynetz Před rokem +2

    If you're as good in playing guitar as you are in Nodejs u got skills... Play one minute in every video

  • @TomershalevMan
    @TomershalevMan Před rokem +1

    you should mention it is a stateful authentication and authorization.
    using UUID is weak because of collisions and you also have to maintain memory storage for it, but with JWT you it is stateless.
    both have pros and cons

    • @minimovzEt
      @minimovzEt Před rokem

      Fore sure but JWT is not good for systems that demand any serious authorization demand, because you can't invalidate someone's auth at will and any authorization you store as payload in the JWT will always be detached from their real time authorization, ie: an admin, user B, changes roles from a normal user, user A, that user A will have old authorization role until his JWT payload expires or until he logins again.

    • @TomershalevMan
      @TomershalevMan Před rokem

      @@minimovzEt right, but you can create some sort of black list

  • @sto2779
    @sto2779 Před rokem +1

    9:20 - You just copied and pasted a cookie and it worked, what if a hacker did the same, copied your cookie and pasted on their browser? Would it not also work for them on their browser while at a different location?

  • @katrinaj.7348
    @katrinaj.7348 Před 6 měsíci

    This video is SO helpful. Thank you for showing the examples!

  • @soniablanche5672
    @soniablanche5672 Před rokem +4

    Authorized implies you are authenticated, but the opposite is not always true.

  • @afamsval
    @afamsval Před rokem +1

    Nice Video Sir!
    I found your top-secret easter egg 😀

  • @sabuein
    @sabuein Před rokem +1

    Thank you, Kyle.

  • @tusharsain2356
    @tusharsain2356 Před rokem +2

    Hey please make a video for error handling on frontside and back-end
    Thanks

  • @jarrayamehdi6566
    @jarrayamehdi6566 Před 5 měsíci

    Hello thank you for this tutorial! I suggest setting Cookie sameSite to lax which is the default one and better for security

  • @tiboristheblackdog4354
    @tiboristheblackdog4354 Před rokem +1

    pls dont ever delete your videos

  • @bob_kazamakis
    @bob_kazamakis Před rokem +7

    Note: Oversimplifying auth greatly increases the risk of not doing it properly. Do not try implementing an auth solution yourself (handling identities or token brokerage) unless you are prepared to have the data breached for the project at hand, or are ready to shell out some cash to some pen testers to ensure you did it right.
    All that being said: use popular auth libraries and brokers (federated identities, Auth0, cognito, etc).

  • @anand_dudi
    @anand_dudi Před rokem +3

    Can you breakdown how payment integration work in application or as general ?

    • @sergsergesrgergseg
      @sergsergesrgergseg Před rokem

      stripe

    • @awekeningbro1207
      @awekeningbro1207 Před rokem

      Through webhooks. You let the Payment gateway charge your customers and then it will trigger the webhook you provided it so that it can "push" that data to your backend

  • @alexm3369
    @alexm3369 Před měsícem

    How does this work then for Baas such as Supabase? In their Nuxt examples they have "useSupabaseClient" which is ran on the front end. Is this still safe? Or am I mixing things up. It seems a lot of examples in a Vue/Nuxt application are performing the checks if the user is signed in on the front end. I know its a little specific to Nuxt but im sure the principle is the same for vanilla JS using Supabase

  • @mznunaya
    @mznunaya Před rokem

    Gawd I love you Kyle. You are hands down my favorite coding content creator.

  • @creativeartdesign4820
    @creativeartdesign4820 Před měsícem

    Hi, good videos, is it possible you to make a very easy example how to use Authjs v5 that is out?
    you may use crediential and mongodb local database.
    if you have time for this. would be very usefulle because the doc on authjs v5 is so week.

  • @sanjarcode
    @sanjarcode Před rokem +1

    Absolutely important video. Explains persistent login state too. Thanks for this. Note: using session-ids or auth tokens doesn't change this flow, do don't worry if you don't know about one. Chill

    • @dabbopabblo
      @dabbopabblo Před rokem

      I will except for the fact that it actually affects every single process of the flow. Choosing between the two in a correct way for your specific projects use case is detrimental to its performance. If you are using session ids and have enough users actively using the site you could have upwards of hundreds of gigabytes of data being stored in memory just for session state information. However if you go the token route you need to realize even tho your saving on ram now for every request even one’s not requiring state information will be sent with all the session state data Unless you go for a naïve approach where you store the token in local storage which will allow for bad actors to exploit your users a lot easier

  • @Smurfis
    @Smurfis Před rokem

    Would you ever show a Auth0 server and HTML and css tutorial? Or even go further into this as a course? I’m interested

  • @itsmmdoha
    @itsmmdoha Před 4 měsíci

    Kyle Cookespeare in rescue again!

  • @andresgama4
    @andresgama4 Před rokem

    I loved ! it was very clear!
    but I have a question, what happens if our client and backend are from different domain?
    I understand that httponly cookies would no longer work, right?
    If that is so, how else could we store the sid?
    Thank you!

  • @ricardoreix
    @ricardoreix Před rokem +7

    What's your opinion on storing the user in a jwt in a cookie? That way isn't necessary a session in a database, but your jwt can be verified as valid in your server

    • @boenrobot
      @boenrobot Před rokem +5

      In my opinion, JWT is great for authentication, but not so much for authorization. Sure, you can include the rules as part of the JWT payload, but the more fine-grained your rules are, the more the size of the JWT payload grows, which in turn means slower requests due to the bigger upload required.
      And if you are only going to use JWT for authentication, the benefit of not needing a database request for the session is lost... i.e. if you are going to consult the DB for authorization, you might as well be better off maintaining a session ID in a key/value store, where the value is a cache for permissions that have been evaluated already, and are thus quick to check.
      If your requirements are as simple as "admin", "moderator", "regular", JWT is probably good enough, but beyond that, probably no.

    • @uplink-on-yt
      @uplink-on-yt Před rokem +3

      In my opinion, that's fine, as long as you check the JWT signature properly, and you're OK with users being able to read the data in the JWT (if you don't encrypt it). There is one difference though: you can't invalidate the session to log someone out. You will still have to store a session ID on the server for anything invalidated and not yet expired.

    • @ricardoreix
      @ricardoreix Před rokem

      @@uplink-on-yt you're right, didn't remembered the option to invalidate the session. Also, storing the refresh token in another cookie is a bad idea right?
      If using refresh tokens, I can invalidate the refresh token, assuming a jwt validity of like a few hours

    • @TomershalevMan
      @TomershalevMan Před rokem +1

      @@uplink-on-yt you can always create a black list on the server or allow tokens for a small amount of time like an hour, JWT is much stronger security given that uuid might have collisions

    • @JoseMedina-xp6vi
      @JoseMedina-xp6vi Před rokem

      @@boenrobot and social auth? (oauth2)

  • @Dadaadad268
    @Dadaadad268 Před 5 měsíci

    is this how you would protect routes in an app also (by sending request to server first)?

  • @edycole5543
    @edycole5543 Před rokem

    thank kyle, very clear auth, request react router 6 with private route for manage authorization area of many form

  • @deepanksharma8212
    @deepanksharma8212 Před rokem +2

    Thanks for the video, great stuff as always. Quick question, doesn't it increases the chances of a CSRF attack if we store the session token in cookies? How do you deal with that stuff?

    • @NickHamilton88
      @NickHamilton88 Před rokem +3

      I didn’t watch video but Basically if you use the cookie approach a CSRF token can help reduce attacks using either Synchronizer or Double Submit pattern. Also make sure your auth cookies use httpOnly with SameSite set to Lax or Strict with cors restricted to specific domain and allow credentials set to true and secure attribute on production, newer browsers and TLS versions will prevent third parties from doing malicious post requests with those cookie and cors settings. Also some things that could provide extra security is restrict your server to only allow Content-Type application/json to enable preflight checks for request. This is just the cookie approach, securing a client JWT is also a pain if you want persistence; auth is not easy if you wanna do it right lol. I’ve gone down the auth rabbit hole so many times, I wish Auth0 custom domains were free 😢

    • @deepanksharma8212
      @deepanksharma8212 Před rokem

      @@NickHamilton88 Thanks a lot for sharing that.

  • @yangenmanuel2659
    @yangenmanuel2659 Před rokem +1

    Bro, this really opened my eyes. Thanks for a video we all need, but didn't realize

  • @brandonjoaocastillo7490

    Well I got Questions, you are using a Map for the sesssions, so imagine if I log in a browser, I create a session, and then in another browser I log in too? do I create another session? would that invalidate my session in the other browser? do my other session gets updated with the new sessionId? or do I get the same sessionId as response? so, basically do I create another sessionId (would have 2 now)? do I replace the current sessionId? or do I keep using the same sessionId?.

  • @valentineedesiriefagene7565

    Yay! I'm glad you're well again.

  • @rammehar5531
    @rammehar5531 Před rokem

    Very nice, hey will you pls make video on how to implement RBAC and how should differentiate admin rest api and frontstore rest apis

  • @vineshkumarramasamy8528

    Very Good Information Dude. I love This

  • @andreasWebDev
    @andreasWebDev Před rokem

    I am curios if you plan also to do more tutorials for Deno/Fresh?

  • @victormog
    @victormog Před rokem +1

    With JWT authorization, SESSION IDs are not needed, right?

  • @yannick2075
    @yannick2075 Před rokem

    what password manager is this? Looks great!

  • @UniParse
    @UniParse Před rokem

    thanks😄😁🌟🌟
    the best/simples video on the platform

    • @UniParse
      @UniParse Před rokem +1

      finally I get rid of other big nightmare

  • @Pluvo2for1
    @Pluvo2for1 Před rokem

    Thank you for all your help Mr Vanilla Ice

  • @brankosibalic9199
    @brankosibalic9199 Před rokem

    How does the secure option in setting up the cookie works? It is supposed to accept cookies sent by https only, but as we can see your example is working fine even if you are using http only.

  • @nvtrinh2001
    @nvtrinh2001 Před rokem

    This is sooo good! Thank you so much!

  • @killian4626
    @killian4626 Před rokem

    could you do a video on http requests? like from the perspective of a javascript sort, but not caching the stash on the server api

  • @DiabloMet
    @DiabloMet Před rokem

    I've spent a few hours trying to get this to work. I click the buttons and absolutely nothing happens.
    I have the extensions cookies.js, cors, express, and live server.
    My code is 1:1 at this point and I do not understand why nothing is happening. If anyone can help it'd be greatly appreciated, thank you.
    EDIT: I hit f12 and found that it was refusing to connect to the port at 3000, I changed all the ports to 5500 and it stil refused to connect. still at a loss here

  • @ttlekich176
    @ttlekich176 Před rokem +1

    Like others have mentioned, this is definitely a simplified pass at authorization - much like a hello world example. Though well explained and a great starting point.
    I suggest looking into Zanzibar-like auth models to go deeper into the topic. I quite like Oso's tool for this - they also have great educational blog posts on authZ.

    • @ttlekich176
      @ttlekich176 Před rokem

      A teacher's access to their classroom's students was mentioned in the video. This is actually an interesting start to a more complex authorization system - classrooms, schools, school districts, etc. (Particularly the users with access to these various levels).

  • @HomelessDeamon
    @HomelessDeamon Před rokem

    perfect explanation as always, keep it up

  • @brandonjoaocastillo7490

    Does that mean that If I know your uuid I can log in as you? there are no more steps of verification?

  • @sitedel
    @sitedel Před rokem

    Authentication is strongly related to HTTP errors.
    The "delete my CZcams channel" example is wrong because the client doesn't ask for the right to do something, (can I delete my CZcams account?), it just try to do the action DELETE on the resource from my.youtube server (HTTP DELETE my.youtube/).
    The server then check authentication (by validating a token, not a UUID), and authorization (by checking if the user is authorized to POST,PUT, UPDATE or DELETE the target resource according to the HTTP request action code, and do the action if those two checks succeeded.
    And if any check or the action fails, then the server must reply with the appropriate HTTP error code (500 - unauthorized, 403 - forbidden, 404 - not found, already deleted ?).
    Session ID on the server is a mess to manage, that's why you should: 1. always keep user related data in some shared cache or database and authenticate the user token for each and every request. 2. ensure that no action depends on a previous transient state, in order to keep "data integrity", aka "does this request fail if it is not received by the server which hold this transient state in session?".

  • @mashleburndead2k
    @mashleburndead2k Před rokem

    Can you make a video about typescript decorator?

  • @ajayshakya361
    @ajayshakya361 Před rokem

    Now in post request cannot saved nor get

  • @cjsimmons6535
    @cjsimmons6535 Před 2 měsíci

    5:40 Found the easter egg; I had to take a look lol

  • @coolingvexation3226
    @coolingvexation3226 Před rokem

    How do you store in local storage or cookies securely on client side? Can anyone hack your local storage and get the session info?

  • @pseudounknow5559
    @pseudounknow5559 Před rokem

    Can you share the github repo please ? I wanted to read it because It's easier to understand

  • @rachidb9624
    @rachidb9624 Před rokem

    You're amazing man !

  • @subareeshkrishnan118
    @subareeshkrishnan118 Před rokem

    Excellent! Now please summarize CSRF tokens.

  • @chrishabgood8900
    @chrishabgood8900 Před rokem

    No Kyle!!! You have a good day!!!!!!

  • @sonamohialdin3376
    @sonamohialdin3376 Před rokem

    Very useful tutorial thank you

  • @hooyah
    @hooyah Před rokem

    Right now im stuck on auth flow.
    I have create nextjs with flow like this. Pls comment if my flow are wrong, and any article's or videos is very helpful
    1. Hit the external api auth
    2. If error trhow error
    3. If success save token in cookie, http only
    4. If the token expired i use axios interceptor to get new token and resend form submit
    It is right?
    Im so confused about the authenticate and authorization. Thanks 🙏

  • @tarekalkhatib5619
    @tarekalkhatib5619 Před rokem

    4:13 obviously or at least hopefully😂😂😂😂

  • @ksrele
    @ksrele Před rokem

    I'm working on PHP web site with login page and I use PHP session stored in Cookie and I din't put any instruction or timer in my code to delete session after some time but after some time user is automatically logged out and I don't know why.
    I Googled this problem but didn't find any good answer so I hope somebody here can help me.

    • @StamyIIReturn
      @StamyIIReturn Před rokem

      Are you using a library for the session? Check if sessions default timeout is x minutes.

    • @ksrele
      @ksrele Před rokem

      @@StamyIIReturn I don't use any library for this, just vanila PHP. It is a bit older PHP but I must use it becouse of other things (connecting to the old Informix DB)

  • @mannu6464
    @mannu6464 Před rokem

    How to safeguard session cookie in order to save it from hackers ?

  • @edwardmacnab354
    @edwardmacnab354 Před rokem

    Can you do this with plain Vanilla Javascript

  • @sahilverma_dev
    @sahilverma_dev Před rokem

    5:35 yeah i found your ester-egg 😍😍

  • @waiwaitea
    @waiwaitea Před rokem +110

    Really oversimplify the whole concept of auth here, it is fine for a beginner friendly concept video but telling people that auth is not hard is kinda misleading, It is okay to do simple authentication in a small website but it won't be really secure for a big one. This is why companies provided auth services because they are more professional than us, we don't really need to be expert at every aspect in CS but we really shouldn't just say one part is "easy" just because we can do a easy version of it

    • @coltonaallen
      @coltonaallen Před rokem +37

      I don't think he's implying that implementing auth is easy but rather auth is "simple" to understand, because I can attest to the fact that it's very daunting as one is starting out. He's telling those who may be less familiar with the concept of auth as a whole, or maybe those who are avoiding it because it's a "scary" topic, not to be afraid, the concept is much simpler that you might expect. After all, this is web dev "simplified" not web dev "exhaustive".

    • @Charles-Darwin
      @Charles-Darwin Před rokem +2

      Exactly what I was thinking

    • @maziasty
      @maziasty Před rokem +14

      He said it's complex in the very first sentence of the video lmao.

    • @jxlambda
      @jxlambda Před rokem +1

      @@maziasty true

    • @arjunyonzan8557
      @arjunyonzan8557 Před rokem +1

      Understand easy but implement with senior principal engineer for more security. Collaborate.

  • @Chris-gz4ie
    @Chris-gz4ie Před rokem

    What do you think of trpc

  • @braiesteanu
    @braiesteanu Před 3 měsíci +1

    found the easter egg!

  • @kingyatharth2075
    @kingyatharth2075 Před rokem +1

    Hi kyle i am currently learning backend but there's one question I am stuck at how do we send files especially larger one from front end to backend like in any chat application

    • @Alex-kb2ws
      @Alex-kb2ws Před rokem

      Forms requests can deal with that. They send binary data and it can be streamed.

    • @StamyIIReturn
      @StamyIIReturn Před rokem

      formData should be able to handle this.

  • @rishiraj2548
    @rishiraj2548 Před rokem

    Thanks

  • @Veedsify
    @Veedsify Před rokem

    Hye Kyle, I have been wanting to build a react front end and express js backend, please any tutorial on that??
    Also crud with react and express

  • @daheck81
    @daheck81 Před rokem +6

    Please don't spread these kind of videos. It's going to make new developers think this is a safe way for authentication. It is way oversimplified

    • @Jaimie-C
      @Jaimie-C Před 2 měsíci

      how should a new dev implement auth?

  • @efihol
    @efihol Před rokem +1

    Just here to say I found your top secret easter egg

  • @mpowereer6992
    @mpowereer6992 Před rokem

    its hard in nextjs to make na auth guard :/

  • @benihahitti3513
    @benihahitti3513 Před rokem

    Your the man

  • @nicolenew1708
    @nicolenew1708 Před rokem

    AMAZING

  • @darz_k.
    @darz_k. Před 6 měsíci

    very.nice

  • @samannoyb
    @samannoyb Před rokem

    Liked it!

  • @drivexyz2297
    @drivexyz2297 Před rokem

    good stuff

  • @MrSodabean
    @MrSodabean Před rokem

    You are the budget Theo!

  • @linquicoaldrinjohn4819

    nice video

  • @tombalabomba3084
    @tombalabomba3084 Před 7 měsíci

    super easy right. Thats propably exacly the way x, meta or google handle their security. No OpenId Connect, no passkeys, no two-factor auth. Just plain simple bs. Thanks for wasting my time

  • @byDavidNoe
    @byDavidNoe Před rokem

    Found it! 🥚

  • @kim92se64
    @kim92se64 Před rokem

    Simply its out-class

  • @patrickxunuo
    @patrickxunuo Před rokem

    I thought the easter egg is the number of likes and views is real-time, turns out I watched the video at 2.3k likes and 47k views 🤣

  • @Randomguy48279xyz
    @Randomguy48279xyz Před rokem

    👍

  • @rvft
    @rvft Před rokem

    First, yeey!

  • @sierragutenberg
    @sierragutenberg Před rokem +2

    5st!

  • @AmericanDragon134
    @AmericanDragon134 Před rokem

    Just 10 seconds ago )

  • @PerryCS2
    @PerryCS2 Před rokem

    Google can delete your channel too :) lol [I know, just joking around]

  • @erickbravo5800
    @erickbravo5800 Před rokem

    This guy deleted my comments

  • @xvzf115
    @xvzf115 Před rokem

    You should give us authorization to delete your videos.

  • @UniParse
    @UniParse Před rokem

    thanks😄😁🌟🌟
    the best/simples video on the platform