JWT best practices for max security

Поділитися
Вставка
  • Опубліковано 9 лют 2025

КОМЕНТАРІ • 7

  • @PSAfterHours
    @PSAfterHours  2 роки тому

    How to revoke a JWT token: ua-cam.com/video/jzB4TfmOZyw/v-deo.html

  • @matthewrichardson8162
    @matthewrichardson8162 Рік тому

    Great video!

  • @heshiebee
    @heshiebee Рік тому

    Great video, very informative

  • @jorgeromero4680
    @jorgeromero4680 2 роки тому

    can you use jwt in inav?

  • @ShibraTai
    @ShibraTai 10 місяців тому

    What if the token gets leaked....if a person has the token he/she would be able to hit the api

    • @imissthestacy4803
      @imissthestacy4803 9 місяців тому

      It would indeed be stolen and used to access api but then expired, as a dev you'd better to protect from this theft rather then figuring out how to stop a stolen one, use http only cookies secure https connection

  • @syffs-sq6bw
    @syffs-sq6bw Рік тому

    sorry but either you dont know what you're talking about, or you're omitting the truth? JWT used in an authorization context is a secret, even if it doesn't contain any secret info, as they're used to perform authenticated calls!
    There's much more to JWT security than what you mention, starting with where they're stored for instance, or how they're generated (fingerprint?) or combined with other security measures.