hanami-fumikiri

Authentication framework

Provides a Hanami-based authentication solution using JSON Web Tokens (JWT) with revocable sessions and support for various reserved claim names.

Hanamirb User Authentication.

GitHub

26 stars
6 watching
3 forks
Language: Ruby
last commit: over 8 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
nickgnd/hanami-jwt-example A JSON API web application with JWT authentication 31
blrb/hanami-realworld-example-app Demonstrates a full-stack Ruby application with CRUD operations, authentication and routing 16
leemour/hanami_id A Hanami framework authentication solution with Warden and Bcrypt integration 15
sebastjan-hribar/tachiban A Hanami-based authentication system with Argon2 password hashing 35
katafrakt/omniauth-hanami An authentication solution for Ruby web applications using Warden and OmniAuth. 14
hanamimastery/jay_doubleu_tee An authentication middleware for web applications using JSON Web Tokens (JWT) and various encryption algorithms. 17
davydovanton/hanami-rodauth A Ruby gem that integrates Rodauth authentication with Hanami web applications. 7
katafrakt/hanami-shrine A Ruby gem that simplifies the integration of Shrine uploader in Hanami applications. 28
davydovanton/hanami-serializer Provides a simple and flexible way to serialize data in Ruby applications using the Hanami framework 21
denisorehovsky/django-elm-auth-with-jwt An example of implementing JSON Web Token authentication using Django and Django REST Framework as backend and Elm for frontend. 20
pac4j/play-pac4j A security library for web applications that supports multiple authentication and authorization protocols 408
davydovanton/rspec-hanami A RSpec testing framework for Hanami web applications 46
eudoxia0/hermetic Security framework for Clack-based Common Lisp web applications 43
davydovanton/hanami-bootstrap Provides Bootstrap integration for Hanami web framework 14
nikosanif/angular-authentication An Angular application demonstrating best practices for user authentication and authorization flows. 236