News
Latest
Top
Search
Submit
Login
Search
▲
3
Top Open Source Authorization Libraries (2024)
(permify.co)
by mooreds |
view
|
0 comments
▲
3
User Identity Isn't Complete Without Authorization
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
3
User Identity Isn't Complete Without Authorization
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
2
Show HN: Grantex – Delegated authorization protocol for AI agents
(github.com)
by mishrasanjeev |
view
|
0 comments
▲
2
The Republic of Bots: OpenClaw and the Authorization Gap
(niyikiza.com)
by niyikiza |
view
|
0 comments
▲
2
Show HN: Reg.Run – Authorization layer for AI agents
by regrun |
view
|
1 comments
▲
2
SailPoint's Authorization Opportunity
(strategyofsecurity.com)
by mooreds |
view
|
0 comments
▲
2
Why Authorization is more important
(oscarevertsson.com)
by johlo |
view
|
0 comments
▲
2
Formal Specification for Authorization: Clarity Before Implementation
(blog.gchinis.com)
by gchinis |
view
|
0 comments
▲
2
The Laws of Externalized Authorization (2024)
(docs.google.com)
by mooreds |
view
|
0 comments
▲
1
Show HN: HumanRoot – Signed proof of human authorization for AI agents
(github.com)
by thinklanceai |
view
|
0 comments
▲
1
Show HN: A runtime authorization layer for AI agents
by rkka |
view
|
0 comments
▲
1
WorkOS now supports Fine-Grained Authorization
(workos.com)
by ddadon10 |
view
|
0 comments
▲
1
AI Authentication and Authorization
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
1
Show HN: Grantex–Open authorization protocol for AI agents(IETF draft submitted)
by mishrasanjeev |
view
|
0 comments
▲
1
Building Authorization in AI Apps (2024)
(pangea.cloud)
by mooreds |
view
|
0 comments
▲
1
Authorization before execution: deciding if an AI should be allowed to act
(github.com)
by celestinestudio |
view
|
0 comments
▲
1
Show HN: Testing an Idea – Per-Decision Authorization Layer for AI Systems
by rkka |
view
|
0 comments
▲
1
The Problem with AI Agents Isn't Identity, It's Authorization
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
1
The Problem with AI Agents Isn't Identity, It's Authorization
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
1
Delegated Agent Authorization Constrained to Semantic Task-to-Scope Matching
(arxiv.org)
by mooreds |
view
|
0 comments
▲
1
Agent Authorization Profile (AAP) for OAuth 2.0
(aap-protocol.org)
by angelcruzdev |
view
|
0 comments
▲
1
MLflow's Missing Validators: An Authorization Bypass Across API Surfaces
(tachyon.so)
by logicx24 |
view
|
0 comments
▲
1
Show HN: Tenuo – Capability-Based Authorization (Macaroons for AI Agents)
by niyikiza |
view
|
0 comments
▲
1
IntentBound: Purpose-aware authorization for autonomous AI agents
by Grokipaedia |
view
|
0 comments
▲
1
IntentBound: Purpose-aware authorization for autonomous AI agents
by Grokipaedia |
view
|
0 comments
▲
1
Is that allowed? Authentication and authorization in Model Context Protocol
(stackoverflow.blog)
by mooreds |
view
|
0 comments
▲
1
Show HN: Lexiso – Authorization layer for AI agents that spend money
by Deonnroberts |
view
|
0 comments
▲
1
A runtime authorization layer for LLM agents
(medium.com)
by naolbeyene |
view
|
0 comments
▲
1
The API Authorization Hierarchy of Needs: Why You Aren't Ready for AI Agents
(auth0.com)
by aaguiarz |
view
|
0 comments
▲
1
What AI Can Tell You About Your Authorization Policies (2025)
(windley.com)
by mooreds |
view
|
0 comments
▲
1
Authorization Before Retrieval: Making RAG Safe by Construction
(windley.com)
by mooreds |
view
|
0 comments
▲
1
Is that allowed? Authentication and authorization in Model Context Protocol
(stackoverflow.blog)
by mooreds |
view
|
0 comments
▲
1
Show HN: Freebird – Authorization without identity using VOPRF cryptography
(freebird.bot)
by flammafex |
view
|
0 comments
▲
1
Is that allowed? Authentication and authorization in Model Context Protocol
(stackoverflow.blog)
by mooreds |
view
|
0 comments
▲
1
Astra – Authorization with Semantic Task-Based Restricted Access
(outshift-open.github.io)
by mooreds |
view
|
0 comments
▲
1
Delegated Authorization Constraining Agents to Semantic Task-to-Scope Matching
(arxiv.org)
by mooreds |
view
|
0 comments
▲
1
OAuth 2.0 Rich Authorization Requests (2023)
(datatracker.ietf.org)
by mooreds |
view
|
0 comments
▲
1
Authorization API 1.0
(openid.net)
by mooreds |
view
|
0 comments
▲
1
LLM Authorization
(docs.permify.co)
by mooreds |
view
|
0 comments
▲
1
User authorization just got 10x harder
(leaddev.com)
by mooreds |
view
|
0 comments
▲
1
Show HN: Implementing OAuth Authorization Code Flow in OpenAPI Based MCP Servers
(github.com)
by r3versii |
view
|
0 comments
▲
1
Why FedRAMP Authorization and CMMC Level 2 Are Now Table Stakes for GovCon AI
(blog.procurementsciences.com)
by mooreds |
view
|
0 comments
▲
1
Top Open-Source Authorization Tools for Enterprises in 2026
(permit.io)
by gemanor |
view
|
0 comments
▲
1
Show HN: A kids book that introduces authorization and permissions concepts
(authzed.com)
by samkim |
view
|
0 comments
▲
1
Authorization: Build vs. Buy (2024)
(permify.co)
by mooreds |
view
|
0 comments
▲
1
Using Abuse Case Scenarios to Find Authorization and Business Logic Flaws
(blog.nviso.eu)
by runtimepanic |
view
|
0 comments
▲
1
A type-safe, composable authorization library for any JavaScript/TS stack
(zapstudio.dev)
by alexandretrotel |
view
|
1 comments
▲
1
Simplify Insurance Authorizations and Billing with Secure ESignatures
(boldsign.com)
by Vijay_Amalan98 |
view
|
0 comments
▲
1
Optimizing Authorization Security: A Guide to Access Control Models
(fusionauth.io)
by mooreds |
view
|
0 comments