Главная
Study mode:
on
1
Introduction
2
About Linda
3
Lost Puppy Project
4
Key Tips
5
Basic Access Token
6
What happened when I took over
7
Picking a token
8
Reading the RFC
9
Token Scopes
10
Creating an Identity Server
11
Testing API
12
What could possibly go wrong
13
Application ID
14
API
15
Security Token Validator
16
Cookies
17
Max cookie size
18
Cookie Chunky Manager
19
Kong has limits
20
Kong has a big head
21
We cant get rid of them
22
Kong error fix
23
Removing the token
24
Why was this a problem
25
Two minds
26
Undocumented endpoints
27
Time
28
Story
29
Why do we have 14day access tokens
30
Recap
31
Love your puppy project
32
Lunch
Description:
Explore the potential pitfalls of adding business logic to tokens in this 48-minute conference talk from NDC Conferences. Learn about the differences between ID tokens and access tokens, and understand the risks associated with adding numerous claims related to business logic. Discover the limitations and security concerns that arise from overloading tokens with excessive information. Follow the journey of the "Lost Puppy Project" to gain insights into best practices for token management. Examine the process of creating an Identity Server, testing APIs, and handling token validation. Delve into practical issues such as cookie size limitations, Kong gateway constraints, and the challenges of undocumented endpoints. Gain valuable knowledge on balancing convenience and security when working with tokens in identity management systems.

Adding Business Logic to Your Tokens - What Could Possibly Go Wrong

NDC Conferences
Add to list
0:00 / 0:00