|
You are here |
yoongkang.com | ||
| | | | |
www.styra.com
|
|
| | | | | Using OAuth2 and OpenID Connect in Open Policy Agent to secure applications and verify the identity of callers. | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | JSON Web Tokens or JWTs are used by some web applications instead of traditional session cookies. Because of their statelessness and the signature implementation there are some security issues that are specific to JWTs. This post describes some ways you can verify that a JWT implementation is secure. | |
| | | | |
www.scottbrady.io
|
|
| | | | | JWTs get a lot of hate from the crypto community, but what are the alternatives? In this article, I look at implementations such as Branca and PASETO to see how they compare to JWTs. | |
| | | | |
www.observeinc.com
|
|
| | | When your AI assistant can inspect logs, metrics, and code in the same window, troubleshooting turns from a crime?scene investigation into a conversation. | ||