The Parts of JWT Security Nobody Talks About | Philippe De Ryck, Google Developer Expert

Поділитися
Вставка
  • Опубліковано 10 лип 2024
  • Join the "Full Stack Developers Israel" future meetups @ www.meetup.com/full-stack-deve...
    JSON Web Tokens (JWT) have become the de facto standard to transfer application claims between the client and the server. By design, they incorporate the use of signatures to ensure the integrity of the data. However, merely signing the data alone is not enough to guarantee security.
    In this talk, we zoom into the security properties of JWTs. After introducing the different signature schemes, we dive into the hard parts nobody talks about. How do you manage and identify the keys used for the signature? How do you handle key rotation? And what about encrypting JWTs? This talk answers all these questions. You will walk away with a set of best practices for adequately securing JWTs.
    Philippe De Ryck is the founder of Pragmatic Web Security, where he travels the world to train developers on web security and security engineering. He holds a Ph.D. in web security from KU Leuven. Google recognizes Philippe as a Google Developer Expert for his knowledge of web security and security in Angular applications.
    video production: מדיה'לה | Mediale
  • Наука та технологія

КОМЕНТАРІ • 36

  • @hnasr
    @hnasr 4 роки тому +59

    My god I learn so much from this talk! Loads of information and the presenter is knowledgeable!

    • @gjuoun
      @gjuoun 4 роки тому +5

      Unbelievable!
      I followed after watched your JWT crash course!

    • @prashanttiwari120
      @prashanttiwari120 3 роки тому +1

      Hi Hussie, great to see your comment here

    • @philippec4448
      @philippec4448 2 роки тому

      You here, how am I not surprised !? By the way I really enjoy your videos, I’ve learned so much from them. Keep up the good work !

  • @Deebool
    @Deebool 3 роки тому +2

    Very clear and detailed yet concise. Thanks you very much!

  • @dmytroshchotkin2939
    @dmytroshchotkin2939 4 роки тому +3

    Thanks, SIr.
    It's a very good explanation!
    Indeed, very clear!

  • @CodeDoctorJet
    @CodeDoctorJet 4 роки тому +3

    Excellent preso. As AppSec professionals we need these kinds of prescriptive information for our developers. I'll definitely be sharing the cheat sheet and recommending more use of things like key IDs rather than just basic jwt sharing. Good stuff.

  • @dsebastien
    @dsebastien 5 років тому +3

    Great presentation, thanks for sharing!

  • @hectormejia499
    @hectormejia499 3 роки тому +3

    Holy crap, JWTs are insanely complex, very good talk! Also scares me that this is the defacto method for "simple and secure" authentication in most APIs.

  • @philippec4448
    @philippec4448 2 роки тому

    Awesome video ! So much to take from it. Thx for sharing it.

  • @Pownas89
    @Pownas89 2 роки тому

    Still a Really good talk where I’ve learned a lot and got a lot of the info confirmed from what others haven’t explained fully. Thanks for a good informative video! 😊

  • @ILyaCyclone
    @ILyaCyclone 3 роки тому +1

    Superb talk, sir!

  • @manojlasantha8499
    @manojlasantha8499 3 роки тому +1

    Great talk ! I learnt a lot from the talk.

  • @MosheEshel
    @MosheEshel 2 роки тому

    Excellent talk, I learned a lot of new things.

  • @KunalMukherjee3701
    @KunalMukherjee3701 3 роки тому

    Excellent power packed talk

  • @codefarm0
    @codefarm0 3 роки тому

    Super awesome. Tons of cool information. Thanks :)

  • @tommasoborgato
    @tommasoborgato 3 роки тому

    Great talk .... learned a lot of new stuff

  • @HenrryPires
    @HenrryPires 3 роки тому +1

    Thanks, amazing talk

  • @liferajib
    @liferajib 3 роки тому

    Best talk on JWT

  • @amitparks
    @amitparks 3 роки тому

    One of the best on JWT , JWS...

  • @scottsmyth3251
    @scottsmyth3251 3 роки тому +1

    super helpful thanks

  • @robertodiana5821
    @robertodiana5821 4 роки тому +4

    the title maintains the promises

  • @ivanmirandastavenuiter6176
    @ivanmirandastavenuiter6176 3 роки тому +1

    Really good talk on JWTs. Really interesting topics. But why the questions weren't added to the video?? Anyway, great!

  • @stokitko
    @stokitko 2 роки тому

    Thanks, you refined a lot for me. Guess what, I made an error when during validation of JWT doesn't checked an issuer with expected. It's funny because I had a hesitation to check it but was too busy by implementing sig verification. Thank you again, you saved billions (I hope) of my future users :)

  • @Tidaltwist
    @Tidaltwist 4 роки тому +5

    It'd have been helpful if there were timestamps for each part. But great talk though.

  • @javadhosseini7524
    @javadhosseini7524 4 роки тому

    thanks for your great video. I have a question. Is it good to store a jwk into a json file?

    • @philippederyck2572
      @philippederyck2572 4 роки тому +1

      Sure, it all depends on how that JWK is used. OpenID Discovery points to a JSON file containing the identity provider's keys ...

  • @Cdswjp
    @Cdswjp 2 роки тому

    Is symmetric signing ever preferred over asymmetric signing?

  • @metalbroga
    @metalbroga 4 роки тому +3

    i have a question that is related to “renewing” jwt, like those apps that never logs you out (like Facebook, instagram)?

    • @Deebool
      @Deebool 3 роки тому

      I wonder about that part too (and security issues that goes along) !

    • @Rheenen
      @Rheenen 3 роки тому +1

      to renew an accesstoken, you send the expired accesstoken + refreshtoken, validate, and send back a new accesstoken if validation was ok. If not, then don't send back new access token.

    • @metalbroga
      @metalbroga 3 роки тому

      @@Rheenen Thanks for the clarification

  • @j-tech9156
    @j-tech9156 2 роки тому

    Got a lot

  • @SM-ok3sz
    @SM-ok3sz 2 роки тому

    Good talk but holy crap is that pointing device annoying.

  • @mr.RAND5584
    @mr.RAND5584 3 роки тому

    it is like md5 can be decoded public in their website jwt; just put the token their and it will give information;

  • @alvis7574
    @alvis7574 3 роки тому

    JWT is basically a digital envelope encrypted with some symmetric encryption algorithm. Could it secure your payload? Maybe. Could that be a problem for a hacker? Nope.