Главная
Study mode:
on
1
Introduction
2
How did we log into these apps
3
Cookies are secure
4
Why is this painful
5
The evolution
6
Tokenization
7
Token Mapping
8
JSON Web Token
9
Header and Body
10
Signature
11
Select Change
12
Show Code
13
No Signature
14
HMAC Hack
15
RSA Public Key
16
Verifying RSA Signature
17
Rotating Keys
18
Key ID
19
JSON
20
Hackproof Security
21
Refresh Tokens
22
Revocation
23
Auth to access tokens
Description:
Explore authentication as a microservice and portable customer identity management in this 38-minute conference talk. Learn about the advantages of microservice architecture and common pitfalls, including increased network chatter and security issues. Discover the basics of authentication and authorization as a microservice, as well as JWT revocation. Gain insights into decoupling authentication, user management, and user data for a portable identity model. Understand the evolution of authentication methods, tokenization, and JSON Web Tokens. Delve into topics such as token mapping, signature verification, key rotation, and refresh tokens. Acquire knowledge on securing your authentication system and implementing revocation mechanisms.

Authentication as a Microservice - Portable Customer Identity Management

OWASP Foundation
Add to list