Главная
Study mode:
on
1
Intro
2
My first computer
3
Small Elk
4
Code
5
HTTP Cookies
6
Recap
7
Session IDs
8
Problems with Session IDs
9
What did we do
10
The problem
11
RFC 77519
12
JWT vs Session ID
13
Token by Reference
14
What does it look like
15
Example
16
symmetric signature
17
both
18
OpenID
19
Blacklist
20
Crosssite scripting attacks
21
CSRF attack
22
How does it work
23
How to use it
24
Multipart forms
25
API Gateway
26
Conclusion
27
Limitations
28
Rotating private keys
29
Token identifier
30
Expiration time
Description:
Explore the advantages of JSON Web Tokens (JWTs) in modern REST architectures through this comprehensive conference talk. Discover how JWTs offer a simpler, fully stateless, and easily scalable approach to session management, eliminating the need for server-side session storage and cluster replication. Learn about the inner workings of JWTs, proper client session handling between browser and server, and additional use cases. Examine the pros and cons of this technology while gaining insights into implementing JWTs in various scenarios, including API gateways and multipart forms. Delve into security considerations such as symmetric signatures, cross-site scripting attacks, and CSRF protection. Gain valuable knowledge on token management, including rotation of private keys, token identifiers, and expiration times.

Stateless with JWT - JSON Web Token

Devoxx
Add to list