Presented by:Stephanie Chamblee
The design of many user-authentication systems have been impacted by the introduction of JSON Web Token technology. Learn why these tokens have caused a stir in the field of web security and also learn how to avoid two of the most common security attacks associated with their use.
In this talk, we'll discuss the context of token-base authentication by contrasting it with traditional authentication systems. We will walk through the parts of a JWT and demonstrate how they work together to enhance security and provide simple user login management. Finally, We'll cover the two most common security vulnerabilities associated with token-based authentication and provide strategies to avoid them.
Level: Introductory and overviewTags:Security