26. JWT Explained | JWT vs SessionID | JSON Web Token | Security Challenges with JWT & its Handling

Поделиться
HTML-код
  • Опубликовано: 27 дек 2024

Комментарии • 60

  • @AyushiGupta-nv2yq
    @AyushiGupta-nv2yq 9 месяцев назад +14

    I just love your explanation. Thank you so much sir.😊😊😊

  • @amitpachghare3238
    @amitpachghare3238 9 месяцев назад +4

    You explain directly using a screenshot and save time to write down code which is time saving there where lots of videos are basic level but you go one step ahead and explain prior to savings time 🎉🎉🎉

  • @amitagarwal779
    @amitagarwal779 9 месяцев назад +1

    Just loved the way this topic was explained. Keep up the awsome work Shrayansh !!!

  • @Sandeep-zd6dq
    @Sandeep-zd6dq 9 месяцев назад +1

    Hmm interesting so jwt helps in saving additional calls to db and off course space as well but yeah third party reliance is too much in token based authentication btw awesome video as always

  • @codingwithanonymous890
    @codingwithanonymous890 8 месяцев назад +1

    Sir please upload all topics by this year your content is truly amazing

  • @DurgaShiva7574
    @DurgaShiva7574 3 месяца назад +1

    Awesome explanation ❤🎉

  • @gajananbengre
    @gajananbengre 9 месяцев назад +1

    Great explanation !!
    Could you please do a video on "Transactional Outbox Design Pattern for microservices"

  • @RN-jo8zt
    @RN-jo8zt 6 месяцев назад

    very clearly you explained it

  • @kajoldixit1334
    @kajoldixit1334 7 месяцев назад +1

    Hi Shrayansh, if each third party has its jwks.json list where they store public key w.r.t Kid in that case can't hacker access the key and decrypt the content?
    --video timestamp (48:20).

  • @vikasrai4915
    @vikasrai4915 3 месяца назад

    are we getting more videos, I just finished the playlist, can't wait. Great content.

  • @saideepak1740
    @saideepak1740 9 месяцев назад +2

    Nice and awesome explanation as usual Shreyansh. Possible to add notes to this

    • @ConceptandCoding
      @ConceptandCoding  9 месяцев назад

      notes i have shared to member community post.

    • @saideepak1740
      @saideepak1740 9 месяцев назад +1

      @@ConceptandCoding sure. No issues. Anyways I am planning to take membership 👍

  • @princepop6922
    @princepop6922 9 месяцев назад +2

    In JWT you have mentioned that no db is included but how come the application server sends the request to validate the token and the authentication server authenticate it without storing the data somewhere?

  • @chandanverma4336
    @chandanverma4336 9 месяцев назад +1

    Its very useful for me

  • @sourabhtote8393
    @sourabhtote8393 5 месяцев назад

    @ConceptandCoding can you share the source material you use for creating your videos? Would love to go in depth in many of the topics covered in your videos.
    Thanks!

  • @Prodcater
    @Prodcater 4 месяца назад +1

    hi @ConceptandCoding can you please start adding the advanced part of this video . will be really helpful .Its a request

  • @PegasiuuuS
    @PegasiuuuS 9 месяцев назад +1

    Great video with loads on knowledge in it. But I feel that video pace is too slow and all this info can be conveyed in less than 30 mins.

  • @MohammedTajuddin-pz5wd
    @MohammedTajuddin-pz5wd 8 месяцев назад +1

    What is the use of 'n' and 'e' when the public key they are forming can't be used, we are using Kid to find the public key from third party. n and e seem redundant as they can be tampered.

    • @ConceptandCoding
      @ConceptandCoding  8 месяцев назад +2

      The 'n' and 'e' components in JWT's public key are used for double verification by the recipient. While the 'kid' header helps locate the correct key, 'n' and 'e' ensure the integrity and authenticity of the key once found.

    • @mkSlayer9
      @mkSlayer9 6 месяцев назад

      @@ConceptandCoding oh got it now

  • @justlc7
    @justlc7 8 месяцев назад +1

    Hey guys, are CDNs and their designs covered in any video in this playlist?

    • @mkSlayer9
      @mkSlayer9 6 месяцев назад

      yes, in the caching one.

    • @justlc7
      @justlc7 6 месяцев назад

      @@mkSlayer9 thanks, ill check that

  • @nikhilthulaseedharan1525
    @nikhilthulaseedharan1525 9 месяцев назад

    When will you be adding remaining HLD questions ?

  • @sumitsehgal5526
    @sumitsehgal5526 3 месяца назад

    Bro will you please make an complete spring security module its very tough to unserstand how its work

  • @infinity-hu4yk
    @infinity-hu4yk 19 дней назад

    Why cannot we encrypt the jwt token with RSA so that attacker is not able to see and sign the token on its own.

  • @saurabhmittal6947
    @saurabhmittal6947 7 месяцев назад

    does resource server has to depend on auth-server to verify JWT ?? wouldn't it increase the load on auth-serve ?

    • @girishanker3796
      @girishanker3796 6 месяцев назад

      Same question and also the extra overhead back and forth calls b/w resource and auth server.

  • @Selvin_raja
    @Selvin_raja 7 месяцев назад

    I have some doubts spring jwt and spring boot jwt are same or notwhat your cover int this video

  • @mannuvishwakarma8411
    @mannuvishwakarma8411 9 месяцев назад

    Can we extend the expiry time of the existing JWT?

    • @ConceptandCoding
      @ConceptandCoding  9 месяцев назад +1

      bo we can not extend the expiry time, there is something called refresh token you get, by which you can get new token, i have covered the refresh token in OAuth video

    • @girishanker3796
      @girishanker3796 6 месяцев назад

      As he mentioned in this video that will add more vulnerability to the token. So by using a refresh token we can get a new token if the old one expires. Also initially while we are setting the claims, we can set the expiry time of JWT as per our wish.

  • @Asingh42
    @Asingh42 9 месяцев назад +1

    I remember JsessionId from servlet and jsp.

  • @DSA_Coding
    @DSA_Coding 7 месяцев назад

    hey shreyansh, can you refer some book also for auth

  • @RN-jo8zt
    @RN-jo8zt 6 месяцев назад

    Symmetric Cryptography:
    A single secret key is used for both creating and validating the token. Both the issuer and the verifier need to have access to this key.
    my question
    how verifier will get this secret key?
    like i will send him personally or it will store in cloud/DB .so he/she can access it , or i will send in mail,teams....

    • @elforeyyy
      @elforeyyy 4 месяца назад

      hello brother may you please assist me in my application used springboot security problem is after a successful login it's calling the login page again not redirecting to the specified endpoint. How can I share my classes with you

  • @FitMitDiary
    @FitMitDiary 8 месяцев назад

    I have a question regarding how is JWT considered to be stateless? I understood the part that there is not any session maintained as compared to traditional cookie/session-based authentication But
    1. If we need a key to decode the jwt token, then the authorization server needs to store the key to decode it right? So will this key be stored in a db? So won't we need to hit the DB to fetch the key.

    • @chander10980
      @chander10980 2 месяца назад

      no need to store and auth server validate using RSA digital signature , (public private key) logic

  • @abhaytiwari6401
    @abhaytiwari6401 9 месяцев назад +1

    isn't authentication server a Single point of failure?

    • @ConceptandCoding
      @ConceptandCoding  9 месяцев назад +2

      its again a distributed microservice.

    • @abhaytiwari6401
      @abhaytiwari6401 9 месяцев назад

      Thanks for the Response Love your videos One more question here are we replicating the same token to every authentication server if it is a distributed system meaning One Microservice calls the authentication server to validate and when I again calls it will get a different server because of load balancer so we will have to replicate same token to every authentication server? Or this is wrong? @@ConceptandCoding

  • @GeneralistDev
    @GeneralistDev 9 месяцев назад

    Please keep updating the udemy course also with these free videos

  • @ShashwatShukla-p8h
    @ShashwatShukla-p8h 5 месяцев назад

    is this HLD series over ?

    • @ConceptandCoding
      @ConceptandCoding  5 месяцев назад

      no, i will start the advance part of it soon

    • @ShashwatShukla-p8h
      @ShashwatShukla-p8h 4 месяца назад

      @@ConceptandCoding oh , i was so happy that i completed HLD and i am ready for interviews !!!!

  • @dynamiteSoul2324
    @dynamiteSoul2324 9 месяцев назад

    Sir if possible after this playlist end , help us making project like book my show , implementing concurrency control as you already explained in one of your video

  • @AmanThakur-ve6ji
    @AmanThakur-ve6ji 9 месяцев назад +2

  • @mozahidhussain3794
    @mozahidhussain3794 9 месяцев назад

    Bhaya spring boot ka series complete kro please

  • @harshitagarwal2682
    @harshitagarwal2682 5 месяцев назад

    👍👍