I
I
Ilusha2013-05-07 11:15:22
PHP
Ilusha, 2013-05-07 11:15:22

Q: User Registration and Authentication Solutions

Good afternoon.
This is my first post, and in it, in fact, I want to ask:

  • what ready-made solutions for user authentication and registration would you recommend to use on a resource that does not contain critical confidential data?
  • What ready-made solutions would you recommend using for third-party authentication through popular Runet resources?
  • Are there comprehensive solutions that combine the previous two points?


At the moment, I am the first to develop a small web system myself and from scratch (javascript, php), gaining experience, so I will be very happy to receive practical advice.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
Z
zednight, 2013-05-07
@Ilusha

All solutions for authorization are in php (session mechanism). But in order to further simplify the task, you can use frameworks like: Yii, Kohana, Zend. I know for sure that for Yii, the blog creation manual completely chews up how to do authorization. There is only one thing, but most likely you will not be able to use the framework authorization and work outside the framework itself, therefore you will have to learn it. There are modules for authorization through Internet resources for frameworks, usually called OAuth. As a rule, there are a lot of manuals on how to integrate them into the framework. But again, all this is within the framework of frameworks.

A
Assorium, 2013-05-07
@Assorium

Most major mail services have their own API. Take a look at uLogin . A very simple way to authenticate. You can also request additional fields.

G
gis, 2013-05-08
@gis

In terms of theory, for the future, keep in mind that today there are the following "protocols" of external authentication:
- OpenID - categorically not recommended, as the most insecure and outdated
- OAuth v.1 - also not recommended for use in new software products due to low security
- OAuth v.2 - information security specialists still allow its use, although there is information about the hacking method
- SAML v.2 - the most secure today and therefore recommended for use, but its implementation has a lot of "pitfalls"

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question