|
You are here |
aaronparecki.com | ||
| | | | |
philodev.one
|
|
| | | | | oAuth is a hard to get into because of its (necessary) complexity. A basic understanding of the standard flow and the actors involved can help to make better decisions and understand the security implications of the choices. | |
| | | | |
www.binovarghese.com
|
|
| | | | | Session and token authentication methods are used by the server to verify the client request is authenticated or not. | |
| | | | |
blog.elmah.io
|
|
| | | | | Learn about how to secure your ASP.NET Core APIs with OAuth 2.0 and JSON Web Tokens without using third-party services like IdentityServer, Okta, and Auth0. | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | JSON Web Tokens or JWTs are used by some web applications instead of traditional session cookies. Because of their statelessness and the signature implementation there are some security issues that are specific to JWTs. This post describes some ways you can verify that a JWT implementation is secure. | ||