Using the BFF pattern to secure SPA and Blazor Applications - Dominick Baier - NDC Oslo 2021

Поделиться
HTML-код
  • Опубликовано: 16 янв 2025

Комментарии • 12

  • @judas1337
    @judas1337 3 года назад +3

    Exactly what I needed for what I’ve been thinking about the last week when it comes to the rewriting of an out-of-date SPA which utilizes the Implicit Flow.

  • @ShakirovRuslan
    @ShakirovRuslan 2 года назад +2

    If a hacker was able to run their code in a 3rd party frontend, doesn't it mean that they can scan the DOM and extract all valuable information from there and even emulate user activity triggering clicks and form submits?
    if yes, then what is point in keeping access token on the backend?

    • @stevehoff
      @stevehoff 2 года назад

      Not if they don't have a token for it.

  • @omarzeidan5798
    @omarzeidan5798 2 года назад +1

    @35:31 BFF idea!

  • @M0ns1gn0r
    @M0ns1gn0r Год назад

    I didn‘t get the X-CSRF header trick. What‘s the point if we have the SameSite cookie that automatically prevents CSRF attacks?

  • @martinp3839
    @martinp3839 2 года назад

    could you please share the demo code?

  • @ZadrodTV500
    @ZadrodTV500 2 года назад

    absolutely great, thank you

  • @ganeshlondhe1
    @ganeshlondhe1 2 года назад

    great work

  • @MohamedEmaish
    @MohamedEmaish 3 года назад

    Thank you

  • @DarkPulsar24
    @DarkPulsar24 3 года назад +1

    Excelent! (y)

  • @mouradaissani8957
    @mouradaissani8957 3 года назад +1

    Thank you

  • @CHITUS
    @CHITUS 3 года назад

    Thank you