Explore >> Select a destination


You are here

aaronparecki.com
| | philodev.one
1.6 parsecs away

Travel
| | oAuth is a hard to get into because of its (necessary) complexity. A basic understanding of the standard flow and the actors involved can help to make better decisions and understand the security implications of the choices.
| | www.binovarghese.com
1.9 parsecs away

Travel
| | Session and token authentication methods are used by the server to verify the client request is authenticated or not.
| | blog.elmah.io
1.6 parsecs away

Travel
| | Learn about how to secure your ASP.NET Core APIs with OAuth 2.0 and JSON Web Tokens without using third-party services like IdentityServer, Okta, and Auth0.
| | www.sjoerdlangkemper.nl
14.6 parsecs away

Travel
| JSON Web Tokens or JWTs are used by some web applications instead of traditional session cookies. Because of their statelessness and the signature implementation there are some security issues that are specific to JWTs. This post describes some ways you can verify that a JWT implementation is secure.