Token-Based Architecture Design

Поділитися
Вставка
  • Опубліковано 20 жов 2024

КОМЕНТАРІ • 17

  • @Feverish_Pitch
    @Feverish_Pitch 8 років тому +2

    One of the better talks on API architecture. Thanks for sharing!

  • @eugenemaysyuk
    @eugenemaysyuk 7 років тому

    If understood correct you advised to keep revoked tokens in store/memcache/db each time user performs log out. It seems to me that the store/memcache/db that contains revoked tokens will grow every time user logged out. In this case there can be negative performance effects. So the question is how to revoke the token correctly? We can probably save the revoked token and its expiration date to the DB and write a schedule task that will clear all expired tokens from the DB everyday. Could you please provide your thoughts on this?

    • @eugenemaysyuk
      @eugenemaysyuk 7 років тому

      On the other hand, if I keep revoked tokens I have to check the store/memcache/db with revoked tokens each request just to make sure that user doesn't use revoked token. It gives rise to poor performance.

  • @wiilillad
    @wiilillad 7 років тому

    JWT is meant to be readable, and not encrypted. If you want a claim to be encrypted, just encrypt it before you add it to the dictionary. It can also be used with asymmetric encryption as well, so you dont need shared secrets.

  • @sudhavishwanath
    @sudhavishwanath 9 років тому +1

    Very informative. Well presented! I learnt a lot. Thank you for this.
    However, I missed one thing. You mentioned the decentralized model of security assurance at the service level, where each each service validates the JWT and deciphers from it the user identity and the client identity. But what about authorization checks? Where is this information stored? In the token itself?

    • @theRealBraZee
      @theRealBraZee 8 років тому

      Yep. Usually a "scopes" in there with an array of permissions.

  • @sweetogo
    @sweetogo 7 років тому

    This video seems Open ID Connect fully maturing, the concept of a refresh token for revocation and a better Log out scenario seem to not even be available to the presenter. Thus the presenter's need for a complex propagation solution and statement that Logout and Revocation are edge cases that can run slower.

  • @balanz11
    @balanz11 4 роки тому

    BTW what font is it?

  • @Play_Streams
    @Play_Streams 7 років тому

    Great video.. I really awesome intro to token-based auth

  • @tmanley1985
    @tmanley1985 8 років тому +23

    I counted 1,203,405 uses of the word, 'uuhhhhhhhh'.

    • @GabeHandle
      @GabeHandle 8 років тому +5

      +tmanley1985 Well, that uhhh killed it for me. I saw your comment first and then made it 52 uuhhhh seconds before I bailed.

    • @topilurus
      @topilurus 6 років тому +1

      uuhhhhhhhh .... lil bit confusing you wrong or maybe i'm wrong, but I recounted aprox in 1,130,786 uses of that word.

  • @vipul2840
    @vipul2840 5 років тому

    Very basic information and aim audance is not for experience engineer I guess

  • @cytomatrix
    @cytomatrix 6 років тому +2

    uuuuhhhhh Good talk. uuuuhhh Thanks.

  • @MrYOUTUB1982
    @MrYOUTUB1982 9 років тому +4

    He talks less on subject and more on Jargons...very bad presentation.

  • @gufranmirza1253
    @gufranmirza1253 7 років тому

    too much uuuuuuuuuhhhhhhh