© 2023 Hashnode
#jwt
In the previous tutorial, you learned about setting up your project using a package-oriented design for integrations and setting up the database for user interactions. Now that you have the foundation…
In modern web development, security is a crucial component of any application. One way to ensure security in a Node.js application is by implementing JSON Web Token (JWT) authentication. In this blog …
Authentication is the process of verifying the identity of a user. It is very important because it makes the applications secure by permitting only authenticated users to access its protected resource…
Introduction JSON Web Tokens (JWT) may seem like an enigma for those new to the world of secure data exchange. But imagine embarking on a thrilling adventure, uncovering a treasure trove of valuable i…
Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. In this blog, we are going to learn about what are JWTs (JSON Web Tokens) and how we can exploit them. We will also see some advanced techniques to exploit …
In the previous article, we already set up a Spring Boot application to protect our REST API using JWT. In doing so, we used the symmetric algorithm HMAC512. How can we sign our tokens using a private key and RSA256? HMAC512 is a modern enc…
As the usage of APIs has grown, so have security concerns surrounding them. It is crucial to safeguard APIs against unauthorized access, hacking, and data breaches. AuthO, a third-party authentication…
I use jwt token to protect my backend endpoints, it works this way: Users log in with username and password, and they get a refresh token (valid for 30 days) and an access token (valid for 5 min); Every time users make a request to the pr…
JWT (JSON Web Token) is a well-known and simple method of authenticating a user. Almost all tutorials you did on the backend, specially API building tutorials probably told you to use JWT. I also thou…
" Are you looking to enhance the security and functionality of your web application? Look no further than JWT tokens." In this composition by CyberSecSimplify, we'll take a deep dive into how JWT toke…