Get in Touch

Course Outline

Introduction

  • Overview of JWT structure
  • Common JWT use cases

JWT Validation

  • Symmetric token signatures
  • Asymmetric token signatures
  • Validating tokens
  • Validating claims

Stolen JWTs

  • Handling stolen JWTs
  • JWT storage considerations
  • Invalidating JWTs

Managing Cryptographic Keys

  • Overview of secret keys
  • Embedding public keys
  • Embedding a URL containing the key

Hacking JWTs

  • Brute force approach
  • Modifying the algorithm from RS256 to HS256
  • None algorithm approach

Summary and Next Steps

Requirements

  • Basic knowledge of web services

Audience

  • Developers
 7 Hours

Testimonials (3)

Related Categories