Skip to main content

Command Palette

Search for a command to run...

Posts tagged “Authentication

Showing 27 posts tagged with Authentication.

  1. The ngrok cheatsheet

    How to run ngrok with Slack webhook authentication? GitHub OAuth? How to serve files? This cheat sheet shows you what else you can do with ngrok!

  2. Decouple policy from sensitive data: introducing Secrets for Traffic Policy

    Secrets let you define and manage sensitive values in secure vaults—no more hardcoding or repetitive edits during regular credential rotations.

  3. Block bad actors and mitigate DDoS attacks with JA4 fingerprints

    Tired of spoofed headers? Use JA4 to fingerprint clients by their TLS handshake and take action with ngrok Traffic Policy.

  4. Terminate TLS however (and wherever) you want with Traffic Policy

    Need custom certs? Want fast mTLS setup? ngrok’s terminate-tls action gives you complete TLS control from one declarative config.

    Apr 23, 2025

    1.3K words

  5. Add secure ingress to the Kubernetes API and access it anywhere

    Want remote access to your Kubernetes API without VPNs or other complicated networking? ngrok’s K8s Operator makes it secure, declarative, and RBAC-friendly.

    Apr 17, 2025

    1.2K words

  6. How I build secure (and VPN-less!) industrial IoT connectivity

    One ngrok agent per factory = secure IoT access, no open firewalls, no VPN pain. Learn how cloud endpoints simplify industrial connectivity.

    Mar 19, 2025

    1.5K words

  7. Introducing the Basic Auth Traffic Policy action

    Secure your endpoints with ngrok’s Basic Auth Traffic Policy, compatible with both interactive and programmatic access to your APIs or apps, in a few minutes.

  8. How to implement mutual TLS (mTLS) with ngrok’s API gateway

    Mutual TLS (mTLS) with an API gateway can help you meet compliance requirements in industries that demand high security for data transmission.

    Aug 13, 2024

    1.4K words

  9. Data at ngrok: A primer

    Understand how ngrok handles your data with advanced security measures, offering clarity and control over your traffic flows and storage.

  10. What is mTLS (mutual TLS) and how does it enhance security?

    Learn how mTLS enhances TLS by requiring mutual authentication between client and server using digital certificates for better security.

    Jun 6, 2024

    806 words

  11. Introducing JWT validation for your API

    ngrok's developer-defined API gateway introduces support for JWT validation. Learn about ngrok's implementation and how to add JWT validation to your APIs.

    Feb 26, 2024

    755 words

  12. Add OAuth 2.0 to a Node.js CRUD app

    Secure a Node.js CRUD app using the ngrok JavaScript SDK for stable domain setup. Implement OAuth through Google for user authentication and authorization.

    Jan 26, 2024

    1.8K words

  13. Bolster control and governance with ngrok Account Domain Controls

    Introducing ngrok Account Domain Controls: Unify user accounts, enforce policies, and secure ngrok usage with ease.

    Nov 8, 2023

    686 words

  14. MFA for your production infrastructure running on ngrok

    Learn how ngrok secures your production infrastructure using MFA and Time-Based One Time Passwords (TOTP).

    Oct 18, 2023

    1.1K words

  15. Authentication at the network edge

    Enhance network security with various authentication methods at the network edge. Thwart unauthorized access and minimize attack surfaces.

    Oct 17, 2023

    922 words

  16. A developer's guide to webhook security

    Webhooks help applications stay up to date with system changes, but are they secure? We guide you through steps to ensure the webhooks you consume are valid.

    Oct 3, 2023

    800 words

  17. Introducing Cloud Edges for all ngrok users

    Announcing the addition of Cloud Edges to our free tier to deliver production apps and APIs on ngrok

    Aug 28, 2023

    723 words

  18. Add Auth0 Authentication and authorization to ngrok traffic

    Securely add production-grade auth with self-service sign-ups, account recovery, and social auth for multiple platforms - integrate ngrok to Auth0.

    Jun 21, 2023

    738 words

  19. Integrating OAuth into your Rust App

    ngrok is useful to run alongside your app. What happens when you embed it and start activating OAuth, webhook verification, load balancing, and more?

    Apr 11, 2023

    1.4K words

  20. Product Updates: ngrok-go, ngrok-rs, OAuth & Webhooks for free

    This month we've been busy with ngrok-go, ngrok-rust, making OAuth and webhook verification free for all plans, and traveling coast to coast and even to Europe.

  21. 1Password and ngrok in Practice

    Managing your ngrok credentials across environments, projects, and teams doesn't have to be complicated. Try the 1Password ngrok shell plugin.

    Mar 21, 2023

    637 words

  22. Building Zoom Apps with ngrok

    The Zoom API has numerous endpoints and capabilities and you can grant fine-grained control over which your app can access.

    Feb 14, 2023

    1.2K words

  23. ngrok becomes Identity Aware with App Users

    See your application users in the ngrok dashboard and view their identity details. This feature is a huge win for security and you can use it today.

    Nov 17, 2022

    648 words

  24. There and Back Again: An OAuth Story

    I've worked with OAuth 2.0 for over 6 years. It's always been a complex and challenging beast to fight until now.

    Jul 26, 2022

    766 words

  25. Authentication with ngrok

    In this post, we cover the different methods you can use for authenticating traffic with ngrok, including OAuth and OpenID Connect using Traffic Policy.

    Jun 8, 2022

    695 words

  26. Deploying ngrok in Production

    In this post, we navigate some of the best practices, key considerations, and features provided by ngrok for production scenarios

    May 3, 2022

    939 words

  27. Securing your Applications with OAuth 2.0 in seconds

    ngrok Secure Tunnels. With one command share your apps, APIs, and systems with the world, without complex network configuration, reliability issues, and NAT.

    Apr 19, 2022

    361 words