/ tags/ security
I’ve been meaning to write this post for a long time. Not because STRIDE Threat Modeling are the hottest buzzwords in cybersecurity—they aren’t. And not because threat modeling is some shiny new…
Greetings to all you geeks out there!
JSON Web Tokens (JWTs) play a crucial role in web application security. In this blog, we walkthrough the concept of JWT, focusing on the different types of claims, the structure of a JWT, and the…
The OAuth 2.0 authorization code flow is a secure and widely adopted method for obtaining access tokens to access user resources on behalf of the user.
Below is a table summarizing the different grant types in OAuth 2.0 along with brief descriptions and recommendations regarding their use:
In this blog post, we will dive into HTTP Basic Authentication, a method rooted in the principles outlined in RFC 7617.
Password-based authentication remains one of the most common and widely used methods to verify user identity in various online systems. It involves users providing a unique combination of a username…