Explore >> Select a destination


You are here

yoongkang.com
| | www.styra.com
2.8 parsecs away

Travel
| | Using OAuth2 and OpenID Connect in Open Policy Agent to secure applications and verify the identity of callers.
| | www.sjoerdlangkemper.nl
1.0 parsecs away

Travel
| | JSON Web Tokens or JWTs are used by some web applications instead of traditional session cookies. Because of their statelessness and the signature implementation there are some security issues that are specific to JWTs. This post describes some ways you can verify that a JWT implementation is secure.
| | www.scottbrady.io
1.5 parsecs away

Travel
| | JWTs get a lot of hate from the crypto community, but what are the alternatives? In this article, I look at implementations such as Branca and PASETO to see how they compare to JWTs.
| | www.observeinc.com
24.0 parsecs away

Travel
| When your AI assistant can inspect logs, metrics, and code in the same window, troubleshooting turns from a crime?scene investigation into a conversation.