Not
Hacker
News
!
Home
Hiring
Products
Discussion
Q&A
Users
Authorization | Trending Topic on Hacker News | Not Hacker News!
Not
Hacker
News
!
Home
Hiring
Products
Discussion
Q&A
Users
Home
/
Discussion
/
Authorization
Back to Discussion
Authorization
Loading...
20 stories
•
24h:
0%
•
7d: 0
•
12 comments
Top contributors:
mooreds
meghan
emreb
andylow
Yutamm
Stories
Related Stories
20 stories tagged with authorization
Oauth Isn't Enough for Agents
12
2 comments
by meghan
Posted
2 months ago
Active
about 1 month ago
OAuth
security
authorization
How Are You Handling Identities for AI Agents?
8
7 comments
by andylow
Posted
2 months ago
Active
about 1 month ago
Artificial Intelligence
identity management
authorization
Is Mcp a Security Nightmare?: a Look Into Mcp Authorization with Oauth2
7
1 comments
by mooreds
Posted
3 months ago
Active
about 1 month ago
OAuth2
MCP
security
authorization
Mcp and AI Agent Authorization. a Guide to Securing the New AI Perimeter
4
0 comments
by emreb
Posted
3 months ago
Active
about 1 month ago
AI Security
Authorization
Cybersecurity
User Identity Isn't Complete Without Authorization
3
0 comments
by mooreds
Posted
about 1 month ago
Active
about 1 month ago
identity management
authorization
acquisition
security
user identity
User Identity Isn't Complete Without Authorization
3
0 comments
by mooreds
Posted
about 1 month ago
Active
about 1 month ago
identity management
authorization
acquisitions
cybersecurity
A New Chapter: Permify Joins Fusionauth
2
0 comments
by mooreds
Posted
about 1 month ago
Active
about 1 month ago
acquisitions
authentication
authorization
startups
tech
The Laws of Externalized Authorization (2024)
2
0 comments
by mooreds
Posted
about 2 months ago
Active
about 1 month ago
authorization
security
identity management
LLM Authz Handbook: a Practical Guide for AI Builders and Users
2
0 comments
by Yutamm
Posted
2 months ago
Active
about 1 month ago
AI
Authorization
Security
Pypi Cerbos-Fastmcp: Fastmcp Powered by Cerbos for Authorization Checks
2
0 comments
by emreb
Posted
3 months ago
Active
about 1 month ago
authorization
Python
Cerbos
Optimizing Authorization Security: a Guide to Access Control Models
1
0 comments
by mooreds
Posted
about 2 months ago
Active
about 1 month ago
authorization
access control
security
Why Treating Them as the Same Breaks Your Security Model
1
0 comments
by mooreds
Posted
about 2 months ago
Active
about 1 month ago
security
authentication
authorization
Verifiedproxy – Identity Verification for AI Agents
1
0 comments
by moonlightdavid
Posted
about 2 months ago
Active
about 1 month ago
Artificial Intelligence
Identity Verification
Authorization
If You Had to Secure Requests to an Authorization Server, How Would You Do It?
1
0 comments
by joshfischer1108
Posted
3 months ago
Active
about 1 month ago
security
authorization
OAuth
Why Authorization for Llms Is Hard
1
0 comments
by meghan
Posted
3 months ago
Active
about 1 month ago
LLMs
authorization
security
Boilerplate Auth Server Implementing Rbac
1
0 comments
by farhan0167
Posted
3 months ago
Active
about 1 month ago
authentication
authorization
FastAPI
Fine Grained Authz: Comparing Cedar and Openfga
1
0 comments
by aaguiarz
Posted
4 months ago
Active
about 1 month ago
authorization
security
Cedar
OpenFGA
A Blog About the Cedar Policy Language
1
2 comments
by mooreds
Posted
4 months ago
Active
about 1 month ago
Cedar Policy Language
Access Control
Authorization
Authorization and Access Control: Case Studies and Solutions Using Elixir
1
0 comments
by amalinovic
Posted
4 months ago
Active
about 1 month ago
Elixir
authorization
access control
case studies
Casl or Casbin for Authorization?
1
0 comments
by chaidhat
Posted
4 months ago
Active
about 1 month ago
authorization
access control
RBAC