Best of JWT β€” 2024

  1. 1
    Article
    Avatar of bitBits and PiecesΒ·2y

    Best-Practices for API Authorization

    API authorization is crucial for securing digital assets and maintaining user trust. Best practices include using token-based authorization with JWT, implementing fine-grained access control, securing API Gateway configuration, and encrypting sensitive data in transit and at rest.

  2. 2
    Article
    Avatar of devtoDEVΒ·2y

    JWT explained in 4 minutes (With Visuals)

    Explanation of JWT authentication, its structure, advantages, and disadvantages.

  3. 3
    Article
    Avatar of communityCommunity PicksΒ·2y

    JWT vs PASETO: New Era of Token-Based Authentication

    The post offers a detailed comparison between JWT (JSON Web Token) and PASETO (Platform-Agnostic Security Tokens), examining their core functionalities, security features, and potential vulnerabilities. While JWT is popular for its simplicity, PASETO addresses many of its security issues by enforcing safer defaults and mitigating algorithm confusion. The post covers the workflows of both token types, their structures, and key differences in their approach to security, making it a valuable read for developers looking to implement secure token-based authentication.

  4. 4
    Article
    Avatar of webdevbeehiivWeb DeveloperΒ·2y

    React Cheat Sheet πŸ“„, JWT Best Practices πŸ”, SAML Visualization πŸ”, CSS Loaders ⏳

    This post offers a variety of resources and updates for web developers, including a React cheat sheet, best practices for JWT authentication, an in-depth visualization of SAML, and a collection of CSS loaders. Additionally, it promotes a free AI and ChatGPT masterclass aimed at enhancing workflow efficiency, covering diverse topics from modern CSS properties to tools for graphics and accessibility.

  5. 5
    Article
    Avatar of syncfusionSyncfusionΒ·1y

    Secure JWT Storage: Best Practices

    JSON Web Tokens (JWTs) are crucial for securing data transmission in single-page applications (SPAs), but they come with security risks such as cross-site scripting (XSS) and cross-site request forgery (CSRF). Secure storage methods include using HttpOnly cookies with the Secure flag, encrypting JWTs before client-side storage, and employing server-side session management. Advanced practices like using web workers and Content Security Policies (CSPs) further enhance security. Continuous security audits and updates are necessary to maintain a secure SPA.

  6. 6
    Article
    Avatar of logrocketLogRocketΒ·2y

    Understanding JWT, OAuth, and Bearer tokens

    In the digital world, authentication and authorization are essential for secure access to online services. JWTs (JSON Web Tokens), OAuth, and Bearer tokens play crucial roles in ensuring security. JWTs are tamper-proof tokens composed of three parts: header, payload, and signature, used for securely transmitting information. OAuth typically utilizes JWTs to transport user information securely. Bearer tokens, included in HTTP headers, authenticate users for accessing protected resources. Understanding these concepts helps improve web security.

  7. 7
    Video
    Avatar of communityCommunity PicksΒ·2y

    Authentication in React with JWTs, Access & Refresh Tokens (Complete Tutorial)

    This post explains the importance of authentication in a React application and how to handle it using JWTs, access tokens, and refresh tokens. It emphasizes the need for proper authentication to ensure security and prevent data breaches. The post also provides a code example that shows how to implement authentication in a React codebase.

  8. 8
    Article
    Avatar of freecodecampfreeCodeCampΒ·2y

    Build a Shopping Cart Backend with Spring Boot and Spring Security

    Master Spring Boot and Spring Security by developing a fully functional shopping cart backend application. This course covers project setup, entity class creation, CRUD operations, service and controller development, and security integration using JWT. Suitable for both beginners and experienced developers, it provides practical insights and skills for backend development.

  9. 9
    Article
    Avatar of logrocketLogRocketΒ·2y

    JWT authentication: Best practices and when to use it

    JWTs are a widely used method for secure data transmission between parties. Although beneficial for API authentication and inter-service communication, JWTs pose challenges, especially in sessions due to token invalidation and storage issues. For secure use, store JWTs in HttpOnly cookies and utilize HTTPS. Consider alternatives for session management to address the limitations and potential security risks associated with JWTs.

  10. 10
    Article
    Avatar of bytebytegoByteByteGoΒ·1y

    EP140: Top 6 Tools to Turn Code into Beautiful Diagrams

    FusionAuth offers a developer-centric, highly customizable auth platform for flexible hosting and unlimited scalability. The post discusses tools for turning code into beautiful diagrams, the differences between pessimistic and optimistic locking for data integrity, a simple explanation of JSON Web Tokens (JWT), and the evolution of HTTP protocols from HTTP/1 to HTTP/3. There's also a mention of a Black Friday promo for a system design course.

  11. 11
    Article
    Avatar of faunFaunΒ·2y

    Spring Boot 3.1 JWT Authentication &Authorization: Secure Your APIs Like a ProπŸ”’

    Learn how to secure your Spring Boot 3.1 applications using JWT authentication and authorization. This guide covers creating a Spring Boot project, setting up dependencies, creating secure endpoints, and configuring JWT tokens for user authentication. Includes practical examples and code snippets to help you implement security measures swiftly.

  12. 12
    Article
    Avatar of communityCommunity PicksΒ·2y

    Stop Recommending JWTs (with symmetric keys) β—† Truffle Security Co.

    This post discusses the issues with using symmetric key JWTs, including the high percentage of guessable keys and the risk of undermining authentication and authorization security.

  13. 13
    Article
    Avatar of bytebytegoByteByteGoΒ·2y

    EP112: What is a deadlock?

    A deadlock occurs when transactions are waiting for each other to release locks on resources. It can be prevented through resource ordering, timeouts, and the Banker's Algorithm. Database management systems have algorithms for detecting deadlocks and selecting victims.

  14. 14
    Article
    Avatar of communityCommunity PicksΒ·2y

    Are you using JWTs for user sessions in the correct way?

    This post discusses the pros and cons of using JSON Web Tokens (JWTs) for user sessions and proposes a session management flow that combines JWTs and server sessions for optimal security and scalability.

  15. 15
    Article
    Avatar of freecodecampfreeCodeCampΒ·2y

    How to Add JWT-Based Authentication in NestJS

    This guide walks through setting up JWT-based authentication in a NestJS application using MongoDB. It covers creating a new NestJS project, setting up the MongoDB database, building user models and schemas, implementing login and signup functionalities with JWT tokens, and testing the endpoints using Postman. It provides a complete solution for secure user authentication, including creating a robust and scalable authentication system.

  16. 16
    Article
    Avatar of faunFaunΒ·2y

    Java 23, SpringBoot 3.3.4, Jakarta 10

    A rapid-start template optimized for microservices and cloud-native architectures using Java 23, SpringBoot 3.3.4, and Jakarta 10. It features a packaging structure based on Hexagonal Architecture, cross-cutting concerns handled via AOP, JWT for authentication and authorization, robust web security, and Docker containerization. The Hexagonal Architecture ensures a clear separation of concerns, maintaining flexibility and adaptability. Comprehensive logging, multiple Spring profiles, and extensive use of Swagger and OpenAPI for API documentation are also highlighted.

  17. 17
    Article
    Avatar of towardsdevTowards DevΒ·2y

    JWT attacks

    JWT attacks can allow attackers to modify tokens and escalate privileges or impersonate users. These attacks can be prevented by using strong algorithms, verifying signatures, validating claims, and implementing proper security measures.

  18. 18
    Video
    Avatar of communityCommunity PicksΒ·2y

    Secure Your .NET Application With Keycloak: Step-by-Step Guide

    Learn how to secure your .NET application using Keycloak, an open-source identity provider compatible with OAuth2 and OpenID. This guide covers setting up a Keycloak realm and client, configuring authentication with JSON Web Tokens (JWT), and implementing an API endpoint for user claims. The tutorial also dives into using distributed tracing with OpenTelemetry to validate and debug your authentication setup.

  19. 19
    Article
    Avatar of systemweaknessSystem WeaknessΒ·2y

    JSON WEB TOKEN (JWT)

    JSON Web Tokens (JWT) are a standard mechanism for transferring cryptographically signed JSON data, commonly used for access control, session handling, and authentication. Unlike traditional session tokens, JWTs store all necessary data client-side, making them ideal for distributed systems. JWTs consist of a payload, a signature, and a header. They are often used with JSON Web Signature (JWS) and JSON Web Encryption (JWE) extensions. JWT vulnerabilities include flawed signature verification, secret key brute-forcing, header parameter injections, and algorithm confusion attacks. To mitigate these risks, it's crucial to perform robust signature verification, use up-to-date libraries, and apply best practices such as setting token expiration dates and avoiding tokens in URL parameters.

  20. 20
    Article
    Avatar of towardsdevTowards DevΒ·2y

    Building a Secure WebSocket API with AWS API Gateway, Lambda, and JWT Authorization using Terraform

    This guide details the steps to build a secure WebSocket API using AWS API Gateway, integrated with AWS Lambda and secured with JWT authorization. The infrastructure setup is automated with Terraform, ensuring a scalable and manageable real-time communication system with CloudWatch logging for monitoring API activity.