The Parts of JWT Security Nobody Talks About | Philippe De Ryck, Google Developer Expert

Поделиться
HTML-код
  • Опубликовано: 4 ноя 2024

Комментарии • 36

  • @hnasr
    @hnasr 4 года назад +59

    My god I learn so much from this talk! Loads of information and the presenter is knowledgeable!

    • @gjuoun
      @gjuoun 4 года назад +5

      Unbelievable!
      I followed after watched your JWT crash course!

    • @prashanttiwari120
      @prashanttiwari120 3 года назад +1

      Hi Hussie, great to see your comment here

    • @qcmira2024
      @qcmira2024 2 года назад

      You here, how am I not surprised !? By the way I really enjoy your videos, I’ve learned so much from them. Keep up the good work !

  • @hectormejia499
    @hectormejia499 3 года назад +3

    Holy crap, JWTs are insanely complex, very good talk! Also scares me that this is the defacto method for "simple and secure" authentication in most APIs.

  • @CodeDoctorJet
    @CodeDoctorJet 5 лет назад +3

    Excellent preso. As AppSec professionals we need these kinds of prescriptive information for our developers. I'll definitely be sharing the cheat sheet and recommending more use of things like key IDs rather than just basic jwt sharing. Good stuff.

  • @Deebool
    @Deebool 4 года назад +2

    Very clear and detailed yet concise. Thanks you very much!

  • @dmytroshchotkin2939
    @dmytroshchotkin2939 4 года назад +3

    Thanks, SIr.
    It's a very good explanation!
    Indeed, very clear!

  • @stokitko
    @stokitko 2 года назад

    Thanks, you refined a lot for me. Guess what, I made an error when during validation of JWT doesn't checked an issuer with expected. It's funny because I had a hesitation to check it but was too busy by implementing sig verification. Thank you again, you saved billions (I hope) of my future users :)

  • @Pownas89
    @Pownas89 2 года назад

    Still a Really good talk where I’ve learned a lot and got a lot of the info confirmed from what others haven’t explained fully. Thanks for a good informative video! 😊

  • @ims-w6s
    @ims-w6s 4 года назад +1

    Really good talk on JWTs. Really interesting topics. But why the questions weren't added to the video?? Anyway, great!

  • @Tidaltwist
    @Tidaltwist 4 года назад +5

    It'd have been helpful if there were timestamps for each part. But great talk though.

  • @qcmira2024
    @qcmira2024 2 года назад

    Awesome video ! So much to take from it. Thx for sharing it.

  • @robertodiana5821
    @robertodiana5821 4 года назад +4

    the title maintains the promises

  • @david-tracy
    @david-tracy 2 года назад

    Is symmetric signing ever preferred over asymmetric signing?

  • @amitparks
    @amitparks 3 года назад

    One of the best on JWT , JWS...

  • @metalbroga
    @metalbroga 4 года назад +3

    i have a question that is related to “renewing” jwt, like those apps that never logs you out (like Facebook, instagram)?

    • @Deebool
      @Deebool 4 года назад

      I wonder about that part too (and security issues that goes along) !

    • @Rheenen
      @Rheenen 3 года назад +1

      to renew an accesstoken, you send the expired accesstoken + refreshtoken, validate, and send back a new accesstoken if validation was ok. If not, then don't send back new access token.

    • @metalbroga
      @metalbroga 3 года назад

      @@Rheenen Thanks for the clarification

  • @ILyaCyclone
    @ILyaCyclone 4 года назад +1

    Superb talk, sir!

  • @MosheEshel
    @MosheEshel 3 года назад

    Excellent talk, I learned a lot of new things.

  • @manojlasantha8499
    @manojlasantha8499 4 года назад +1

    Great talk ! I learnt a lot from the talk.

  • @KunalMukherjee3701
    @KunalMukherjee3701 3 года назад

    Excellent power packed talk

  • @codefarm0
    @codefarm0 3 года назад

    Super awesome. Tons of cool information. Thanks :)

  • @dsebastien
    @dsebastien 5 лет назад +3

    Great presentation, thanks for sharing!

  • @liferajib
    @liferajib 3 года назад

    Best talk on JWT

  • @javadhosseini7524
    @javadhosseini7524 4 года назад

    thanks for your great video. I have a question. Is it good to store a jwk into a json file?

    • @philippederyck2572
      @philippederyck2572 4 года назад +1

      Sure, it all depends on how that JWK is used. OpenID Discovery points to a JSON file containing the identity provider's keys ...

  • @HenrryPires
    @HenrryPires 4 года назад +1

    Thanks, amazing talk

  • @scottsmyth3251
    @scottsmyth3251 4 года назад +1

    super helpful thanks

  • @tommasoborgato
    @tommasoborgato 3 года назад

    Great talk .... learned a lot of new stuff

  • @SM-ok3sz
    @SM-ok3sz 3 года назад

    Good talk but holy crap is that pointing device annoying.

  • @mr.RAND5584
    @mr.RAND5584 4 года назад

    it is like md5 can be decoded public in their website jwt; just put the token their and it will give information;

  • @j-tech9156
    @j-tech9156 3 года назад

    Got a lot

  • @alvis7574
    @alvis7574 3 года назад

    JWT is basically a digital envelope encrypted with some symmetric encryption algorithm. Could it secure your payload? Maybe. Could that be a problem for a hacker? Nope.