JWT best practices for max security

Поделиться
HTML-код
  • Опубликовано: 7 ноя 2024

Комментарии • 7

  • @PSAfterHours
    @PSAfterHours  2 года назад

    How to revoke a JWT token: ruclips.net/video/jzB4TfmOZyw/видео.html

  • @heshiebee
    @heshiebee Год назад

    Great video, very informative

  • @matthewrichardson8162
    @matthewrichardson8162 Год назад

    Great video!

  • @jorgeromero4680
    @jorgeromero4680 2 года назад

    can you use jwt in inav?

  • @ShibraTai
    @ShibraTai 7 месяцев назад

    What if the token gets leaked....if a person has the token he/she would be able to hit the api

    • @imissthestacy4803
      @imissthestacy4803 5 месяцев назад

      It would indeed be stolen and used to access api but then expired, as a dev you'd better to protect from this theft rather then figuring out how to stop a stolen one, use http only cookies secure https connection

  • @syffs-sq6bw
    @syffs-sq6bw 10 месяцев назад

    sorry but either you dont know what you're talking about, or you're omitting the truth? JWT used in an authorization context is a secret, even if it doesn't contain any secret info, as they're used to perform authenticated calls!
    There's much more to JWT security than what you mention, starting with where they're stored for instance, or how they're generated (fingerprint?) or combined with other security measures.