Security & Auth Skills
770 skills in this category Β· Page 30 of 33
Browse the most popular security & auth skills on TrustedSkills.
Authentication
Verifies user identities and access rights securely, ensuring only authorized individuals can utilize applications or data.
Gainforest Oauth Setup
Helps with OAuth, setup and configuration as part of implementing security and authentication workflows.
Create Auth Skill
Helps with creation, authentication as part of implementing security and authentication workflows.
Auth Provider
Securely manages authentication providers (OAuth, SAML, etc.) to streamline user access and authorization workflows.
Broken Authentication Testing
Simulates broken authentication scenarios to identify vulnerabilities in systems using automated testing techniques.
Cloudbase Auth
Securely authenticate users and applications accessing Tencent Cloud Base resources via robust identity management.
Dual Auth Rbac
Enforces granular role-based access control with dual authentication for enhanced security and compliance.
Spring Security
Secure Spring Boot applications with expert guidance on authentication, authorization, and common vulnerabilities from teachingai.
Mobile Security Mobsf
Helps with mobile development, security as part of implementing security and authentication workflows.
Mobile Rbac
Enforces granular mobile device access control policies based on user roles, ensuring secure data handling.
Mobile Auth Patterns
Helps with mobile development, authentication, patterns as part of implementing security and authentication workflows.
Backend Security Coder
Helps with backend development, security as part of implementing security and authentication workflows.
Jwt Decoder
Provides JWT guidance and assistance for implementing security and authentication.
Security Incident Playbook Generator
Automatically generates tailored incident response playbooks based on your organization's systems and threat landscape.
Rbac Permissions Builder
This RBAC Permissions Builder simplifies creating granular role-based access control policies for enhanced application security and streamlined permission management.
Api Security Hardener
Helps with API, security as part of implementing security and authentication workflows.
Rbac Policy Tester
This RBAC Policy Tester validates your role-based access control policies, ensuring secure permissions and preventing unauthorized actions.
Security Pr Checklist Skill
Generates comprehensive pull request checklists to ensure secure code changes based on industry best practices.
Test Skill
Helps with Vercel, security, testing as part of implementing security and authentication workflows.
Sast Eslint Security
Helps with ESLint, security as part of implementing security and authentication workflows.
Compose Security Lint
Analyzes code for common security vulnerabilities and suggests remediation steps based on industry best practices.
Security Audit
Helps with AI, security, auditing as part of implementing security and authentication workflows.
Pentest Checklist
This Pentest Checklist generates a comprehensive security audit plan, streamlining penetration testing and ensuring thorough coverage.
Tizen Compliance Checker
This tool verifies Tizen device configurations against industry standards, ensuring security and regulatory compliance for your IoT deployments.