Best of JWT2023

  1. 1
    Article
    Avatar of bytebytegoByteByteGo·3y

    Sessions, Tokens, JWT, SSO, and OAuth in One Diagram

    The article explains the concepts of sessions, tokens, JWT, SSO, and OAuth in one diagram and discusses the impact of web session management on web applications. It also provides information on the most used Linux commands and outlines the aspects of cloud-native adoption. Additionally, it compares the event sourcing system design with the normal CRUD system design.

  2. 2
    Article
    Avatar of communityCommunity Picks·3y

    Auth.js

    Use with any OAuth 2 or OpenID Connect provider - Built in email / passwordless / magic link. Use with any username / password store.

  3. 3
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP69: Explaining JSON Web Token (JWT) To a 10 Year Old Kid

    This week’s system design refresher: DevOps vs. SRE vs. Platform Engineering. Explaining JSON Web Token (JWT) to a 10-year-old Kid is a special box called a JWT. The header is like the label on the outside of the box. It tells us what type of box it is and how it's secured.

  4. 4
    Article
    Avatar of bytebytegoByteByteGo·3y

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1. We discuss the problems each method solves and how to choose the right authentication method for our needs. The diagram below shows where these methods apply in a typical website architecture and their meanings.

  5. 5
    Article
    Avatar of hnHacker News·2y

    Stop using JSON Web tokens for user sessions

    Using JSON Web tokens (JWTs) for user sessions without an effectively implemented logout mechanism can lead to security vulnerabilities. An XSS vulnerability can allow an attacker to access and exploit the JWT, gaining unauthorized access to the application.

  6. 6
    Article
    Avatar of communityCommunity Picks·3y

    Backend API, Middleware, Database, JWT

    Learn how to create a MERN stack application with authentication, using Express, MongoDB, Mongoose, React, Redux, React Router, and React Bootstrap. Implement authentication using JSON Web Tokens (JWT) and HTTP-only cookies. Includes backend API, middleware, database, and JWT.

  7. 7
    Article
    Avatar of asayerasayer·3y

    React: Performing Authentication with JWT

    This article will discuss how to perform JWT authentication in a React app. We will cover the steps involved in setting up a backend JWT endpoint, signing up and signing in from your React app, and protecting routes with JWT validation. You will use a custom-built Express server API to relay the JWT token for a user.

  8. 8
    Article
    Avatar of hackernoonHacker Noon·3y

    How to manage state in Next.js 13 using Redux Toolkit.

    We will go through a real world example whereby, we need to store authentication data in redux state and in this case, it will be persisted. We will also access this data in the some of the components that need it. We will use Redux Toolkit to manage state in Next.js.

  9. 9
    Article
    Avatar of amplicationAmplication·3y

    4 Common Mistakes Made by Node.js Developers

    The growth of Node.js is tremendous, it has a rich packages ecosystem, it’s battle-tested and the usage of JavaScript allows businesses to go full-stack and cut the development lifecycle short.

  10. 10
    Article
    Avatar of snykSnyk·2y

    Top 3 security best practices for handling JWTs

    Ensure the security of your web applications by following the top 3 security best practices for handling JWTs. Keep JWTs secret, validate them properly, and set expiration times to prevent vulnerabilities and breaches. Use tools like Snyk to identify and remediate security issues related to JWTs.

  11. 11
    Article
    Avatar of freecodecampfreeCodeCamp·3y

    Rust Project – Create an Authentication Server

    Rust Project is designed to provide developers with the skills and knowledge they need to implement modern authentication solutions. The Rust programming language is often used for system-level programming, emphasizing safety, concurrency, and performance. The course offers a step-by-step guide to understanding and implementing user authentication in Rust.

  12. 12
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)

    This post explains the concept of JSON Web Tokens (JWT), specifically focusing on the explanation and exploitation of JWT header parameters such as JWK and JKU. It provides examples and discusses techniques for exploiting these parameters.

  13. 13
    Article
    Avatar of medium_jsMedium·3y

    Go Fiber vs Rust: Performance comparison for JWT verify and MySQL query

    Go Fiber vs Rust: Performance comparison for JWT verify and MySQL query. Fiber, built on the foundation of fasthttp, shows promising potential for superior performance compared to Gin. In prior tests, Gin outperformed Rust for this particular use case. With Fiber, we anticipate even more impressive results.

  14. 14
    Article
    Avatar of newstackThe New Stack·3y

    OAuth.Tools: The Online Tool That Goes beyond JWTs

    OAuth is a free online tool provided by Curity. It offers incredible features for anyone working with or interested in OAuth and OpenID Connect. You can decode or create JWTs with different characteristics, fetch tokens from a server, revoke tokens or add an access token to external API calls.

  15. 15
    Article
    Avatar of amplicationAmplication·3y

    Creating a Chatroom in Angular using Amplication

    Amplication is a stunningly powerful web framework that combines design and development seamlessly. Amplication generates a backend server based on a data model defined by the developer. It also supports GraphQL and REST APIs, allowing developers to create flexible and modern applications. In this article, we will discuss how to create a chatroom in Angular using Amplication.

  16. 16
    Article
    Avatar of dzDZone·3y

    Using JSON Web Encryption (JWE)

    JSON Web Encryption (JWE) could be used when one needs to add sensitive information to a token that one would not want to share with other systems. In this case, the user can decode the token and get all the information from the payload. The full specification of JWE can be found in RFC7516.

  17. 17
    Article
    Avatar of permitioPermit.io·3y

    Add a Slack Chatbox Directly into Your React App

    Add a Slack Chatbox Directly into Your React App to your React App. Use React authorization and the Slack API to build a Slack-based chat box in your frontend app. Use FoAz, a feature in Permit.io that allows us to call backend APIs from the front end app.

  18. 18
    Article
    Avatar of communityCommunity Picks·3y

    Authentication for the frontend cloud – Vercel

    The frontend cloud is characterized by performance. It enables both faster application development and faster end-user interactions. At Clerk, we build authentication for the front end cloud. It's much easier to get started, and developers simply use as a foreign key throughout their database.

  19. 19
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·3y

    JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x01)

    Learn about JWT's, their structure, and how they can be exploited. Explore flawed signature verification and brute forcing the secret key.

  20. 20
    Article
    Avatar of newstackThe New Stack·3y

    Secure Go APIs with Decentralized Identity Tokens, Part 1

    The rise of decentralized identity tokens adds a new dimension to API security. Traditionally, API authentication and authorization relied heavily on centralized identity providers. Decentralized identity tokens allow individuals to have greater control over their identities and authenticate themselves without relying on central authority.

  21. 21
    Article
    Avatar of systemweaknessSystem Weakness·2y

    Create Secure Login and Registration with JWT & Best Security Practices

    Learn how to create a secure login and registration system with JWT in Express.js and Node.js. Install the necessary packages and implement best security practices to prevent cyber attacks.

  22. 22
    Article
    Avatar of awstipAWS Tip·3y

    Laravel Authentication and Authorization: JWT and Policies

    Laravel Authentication and Authorization: JWT and Policies are PHP classes that implements access control and hence authorization by defining authorization logic for a given model or resource. Every content that may be served by an API may be considered as a resource. This includes images as well as data stored in the database.

  23. 23
    Article
    Avatar of auth0Auth0·3y

    How to Validate JWTs in .NET

    This article will explain why you need to validate a JWT, what it means in general, and how to do it in the.NET platform.NET. JWTs are an open standard that defines how to share information between parties using the JSON format. The meaning of the token depends on the specific context or application.