Trending

#jwt

Latest posts tagged with #jwt on Bluesky

Latest Top
Trending

Posts tagged #jwt

#JWT #MilitaryEthics #MilitaryHonor

1 0 0 0
Preview
How to Implement JWT Authentication in ASP.NET Core Minimal API - Ottorino Bruni Discover how to secure your ASP.NET Core APIs using JSON Web Tokens (JWT). Learn about JWT structure, authentication, authorization, and best practices for modern API security with practical implement...

Secure your Minimal APIs with JWT! 🔒
Stateless • Scalable • Token-based auth
Client → credentials → JWT → protected endpoints
Why JWT rules modern .NET APIs: no sessions needed!
#dotnet #aspnetcore #csharp #JWT #MinimalApis www.ottorinobruni.com/how-to-imple...

0 0 0 0
Pattern card: The 'Trust Me' JWT Parser (Security). Stats: Latency 0/100, Pain N/A, Maintain N/A, Resume N/A. Quote: "Why pull in a heavy dependency like 'jjwt' or 'jose'? Parsing a JWT is just splitting a string by dots and decoding Base64. Easy!". Special ability: Role Elevation by Notepad - An attacker changes 'role: user' to 'role: admin' in the Base64 payload. The backend accepts it without checking the signature.

Pattern card: The 'Trust Me' JWT Parser (Security). Stats: Latency 0/100, Pain N/A, Maintain N/A, Resume N/A. Quote: "Why pull in a heavy dependency like 'jjwt' or 'jose'? Parsing a JWT is just splitting a string by dots and decoding Base64. Easy!". Special ability: Role Elevation by Notepad - An attacker changes 'role: user' to 'role: admin' in the Base64 payload. The backend accepts it without checking the signature.

Analysis
The result of “Not Invented Here” syndrome applied to cryptography. The developer understood that a JWT contains data, but missed the part where the signature ensures integrity.

The Reality: Your authentication logic essentially trusts whatever the client sends. You are not verifying the certificate or the HMAC secret. A script kiddie can simply paste your token into jwt.io, change the user ID to 1 (or the role to admin), and your backend happily executes the request. You have built a VIP entrance for hackers.

Analysis The result of “Not Invented Here” syndrome applied to cryptography. The developer understood that a JWT contains data, but missed the part where the signature ensures integrity. The Reality: Your authentication logic essentially trusts whatever the client sends. You are not verifying the certificate or the HMAC secret. A script kiddie can simply paste your token into jwt.io, change the user ID to 1 (or the role to admin), and your backend happily executes the request. You have built a VIP entrance for hackers.

🚨 WoB Pattern: The 'Trust Me' JWT Parser

One of my favorites, since we saw it in the wild.

"Why pull in a heavy dependency like 'jjwt' or 'jose'? Parsing a JWT is just splitting a string by dots and decoding Base64. Easy!"

worstofbreed.net/patterns/tru...

#worstofbreed #Security #JWT #TechHumor

0 1 0 0
service method that creates a jwt token. no jwt/identity specific types in input or output (thats my viewmodel). claims in the token include not only obvious user properties but also Sub(ject), user id - I didn't use it before - and Jti, token id. token's time properties, validity start and expiry, are saved in utc (earlier inexperienced me used local time, dont do that)

service method that creates a jwt token. no jwt/identity specific types in input or output (thats my viewmodel). claims in the token include not only obvious user properties but also Sub(ject), user id - I didn't use it before - and Jti, token id. token's time properties, validity start and expiry, are saved in utc (earlier inexperienced me used local time, dont do that)

program.cs part where jwt authentication is added. key is generated dynamically!!)) from 256 crypto random bytes (earlier I used 2 guids squished together to make 32 bytes, but that's not enough entropy). of course default scheme is set to jwt, don't forget to set challenge scheme too! or else unauthorized requests will be redirected to a /login action, even if it doesn't exist, and in total weirdly result in 405 instead of 401! 
next i'm validaiting not only key and lifetime, but issuer and audience too. and discovered such thing as clock skew! extra lifetime for tokens can you imagine! by default its 5 minutes - so i was setting 15 mins of lifetime to my tokens but actually they were made valid for 20! so i zeroed it of course

program.cs part where jwt authentication is added. key is generated dynamically!!)) from 256 crypto random bytes (earlier I used 2 guids squished together to make 32 bytes, but that's not enough entropy). of course default scheme is set to jwt, don't forget to set challenge scheme too! or else unauthorized requests will be redirected to a /login action, even if it doesn't exist, and in total weirdly result in 405 instead of 401! next i'm validaiting not only key and lifetime, but issuer and audience too. and discovered such thing as clock skew! extra lifetime for tokens can you imagine! by default its 5 minutes - so i was setting 15 mins of lifetime to my tokens but actually they were made valid for 20! so i zeroed it of course

program.cs part where authorization for swagger is defined. basically an Authorize button appears in swagger UI that opens a slot where you insert a token, and then this token is added to your requests. (thats completely new to me! made this thingy for the first time! earlier when tokens came into view, for using an API I had to to switch from swagger to postman :'>) here I configured a basic pair of security definition and security requirement. as you can see, its specified that the protocol used is HTTP, auth schema is Bearer, more detailedly the Bearer format is JWT and token should be situated in the request header. and apparently to join this security definition + requirement pair, the definition name should be the same as the reference ID in the security scheme, in this case JwtBearerDefinition

program.cs part where authorization for swagger is defined. basically an Authorize button appears in swagger UI that opens a slot where you insert a token, and then this token is added to your requests. (thats completely new to me! made this thingy for the first time! earlier when tokens came into view, for using an API I had to to switch from swagger to postman :'>) here I configured a basic pair of security definition and security requirement. as you can see, its specified that the protocol used is HTTP, auth schema is Bearer, more detailedly the Bearer format is JWT and token should be situated in the request header. and apparently to join this security definition + requirement pair, the definition name should be the same as the reference ID in the security scheme, in this case JwtBearerDefinition

example of how swagger auth works. in this slot I paste the token and in my requests an Authorization header with Bearer scheme and this token gets added. which you can see in the background, as well as a successful response from an action that needs authorization

example of how swagger auth works. in this slot I paste the token and in my requests an Authorization header with Bearer scheme and this token gets added. which you can see in the background, as well as a successful response from an action that needs authorization

yesterday added JWT authentication in a practice API

clearly improved in making JWT this time:
✅ token expiry in UTC
✅ generating key from 256 random bytes
✅ validating audience not just issuer
✅ using Sub claim (=user ID)
✅ made an auth slot in swagger!

#dotnet #dev #jwt #backend #buildinpublic

1 1 0 0
Preview
Revolutionize Menopause with the Japanese Walking Method If menopausal symptoms are kicking your tail, this revolutionary Japanese Walking Method may just be what you need to reverse the effects of the symptoms. Are you experiencing frustrating menop...

If menopausal symptoms are kicking your tail, this revolutionary Japanese Walking Method may just be what you need to reverse the effects of the symptoms. femmefitalefitclub.com/revolutioniz... #japanesewalkingmethod #JWT #walking #walkingmethod #menopausefitness

0 0 0 0

Biggest takeaway today?
Every tool exists to solve a specific problem. Once you understand the PROBLEM, the tool makes total sense. 💡

Still a beginner but connecting the dots every single day! 💪

#BackendDevelopment #NodeJS #ExpressJS #JWT #MongoDB #100DaysOfCode #WebDevelopment #LearningInPublic

4 0 0 0
Post image

🚀 Today I spent time diving deep into Backend Development and honestly my mind is blown.

Here's everything I learned in one post 👇

#BackendDevelopment #NodeJS #ExpressJS #JWT #MongoDB #100DaysOfCode #WebDevelopment #LearningInPublic

4 0 2 0
Preview
CVE-2026-29000: CWE-347 Improper Verification of Cryptographic Signature in pac4 CVE-2026-29000 is a critical vulnerability affecting the pac4j-jwt library, specifically in versions prior to 4.5.9, 5.7.9, and 6.3.3. The issue arises from improper verification of cryptographic signatures (CWE-347) in the JwtAuthenticator

🚨 CRITICAL flaw in pac4j-jwt (v4.0/5.0/6.0): Attackers can bypass authentication using forged JWTs if they have your RSA public key. Upgrade to 4.5.9/5.7.9/6.3.3+ ASAP! radar.offseq.com/threat/cve-2026-29000-cw... #OffSeq #JWT #AppSec

0 0 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

The livestream starts NOW! 🔴 Security you can’t prove isn’t security, it’s hope.

Stop relying on manual checks. We’re showing you how to automate your security testing to ensure your API only accepts your trusted tokens.

🔗 Join us now: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

1 1 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

Join our livestream in 1 HOUR! 📣 JWTs are the industry standard, but are they right for your specific architecture?

We’re breaking down the strategic trade-offs between JWTs vs. Opaque Tokens.

Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

1 0 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

Tomorrow! Join our livestream on March 3rd.

Stop relying on manual checks. We’re showing you how to automate your security testing to ensure your API only accepts your trusted tokens.

🔗 March 3rd. Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

1 2 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

JWTs are the industry standard, but are they right for your specific architecture?
We’re breaking down the strategic trade-offs between JWTs vs. Opaque Tokens.

🔗 March 3rd. Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

1 0 0 0
Post image

🚀 Learned real JWT auth flow today:
• Access Token → stored in memory
• Refresh Token → stored in HTTP-Only cookie 🔐
• Avoid localStorage for JWT (XSS risk)
• Use Bearer headers to access protected APIs
• Refresh token auto-generates new access token when expired
#NodeJS #JWT #BackendDev

0 0 0 0
Preview
GitHub - josuebrunel/ezauth: Simple and easy to use authentication library for Golang Simple and easy to use authentication library for Golang - GitHub - josuebrunel/ezauth: Simple and easy to use authentication library for Golang

I'm very happy with the current version of #EzAuth. Authentication should be quick and easy to setup in #Golang Very close to v1.0.0 #buildinpublic #auth #jwt #oauth2

github.com/josuebrunel/...

1 1 0 0

Ich glaube, meine Webdeveloper-Zeiten sind wirklich vorbei. Und ich bin vielleicht mehr Astronomie-Nerd als ich dachte. Jedenfalls habe ich gerade anstatt

#JWT Token not found

folgendes gelesen:

#JWST Token not found

🤪

0 0 0 0
Post image

Security you can’t prove isn’t security, it’s hope.

Stop relying on manual checks. We’re showing you how to automate your security testing to ensure your API only accepts your trusted tokens.

🔗 March 3rd. Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

3 0 0 0

Day 56 of #100DaysOfcode

- work on polishing my resume a bit.
- work on creating project that i use daily to track my progress and tasks
- brushing up my fundamentals of jwt

#LearnInPublic #jobhunt #jwt

1 0 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

JWTs are the industry standard, but are they right for your specific architecture?

We’re breaking down the strategic trade-offs between JWTs vs. Opaque Tokens.

🔗 March 3rd. Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

1 1 0 0
Just a moment...

Implement #JWT authentication in #ASPNETCore securely! Learn step-by-step to safeguard your APIs by following this detailed guide. Enhance your app's security and manage user access effectively. Check it out for robust solutions!

0 0 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

JWTs are the industry standard, but are they right for your specific architecture?

We’re breaking down the strategic trade-offs between JWTs vs. Opaque Tokens.

🔗 March 3rd. Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

0 0 0 0
Just a moment...

Learn why JSON Web Tokens (JWT) are vital for modern web development! Enhance security, scalability, and efficiency of authentication processes. #WebDevelopment #JWT

0 0 0 0

#Keycloak CVE-2026-1529: "lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access."


access.redhat.com ->

#JWT


Original->

0 0 1 0
Post image

Should you blindly trust JWTs for accessing APIs? 😟

You’ve got OAuth 2.0 and JWTs, but a single misconfiguration in your library can leave you wide open. Join Wesley to see why "standard" validation isn't always enough.

🔗 Be there on March 3rd: duende.link/lsjwt26

#OAuth2 #DotNet #JWT

0 0 0 0
Preview
Livestream: Are your access tokens really secure? Are your APIs vulnerable? Explore JWT pitfalls, learn to prevent exploits, and compare JWTs vs. opaque tokens in this expert-led session.

Security you can’t prove isn’t security, it’s hope.

Stop relying on manual checks. We’re showing you how to automate your security testing to ensure your API only accepts your trusted tokens.

🔗 March 3rd. Be there: duende.link/lsjwt26b

#OAuth2 #JWT #DotNet

0 2 0 0
Preview
GitHub - lestrrat-go/jwx: Complete implementation of JWx (Javascript Object Signing and Encryption/JOSE) technologies for Go. #golang #jwt #jws #jwk #jwe Complete implementation of JWx (Javascript Object Signing and Encryption/JOSE) technologies for Go. #golang #jwt #jws #jwk #jwe - lestrrat-go/jwx

github.com/lestrrat-go/... is now equipped with AGENTS.md / CLAUDE.md, should you need one.
github.com/lestrrat-go/...

#golang #jwt

0 0 0 0
Preview
Revolutionize Menopause with the Japanese Walking Method If menopausal symptoms are kicking your tail, this revolutionary Japanese Walking Method may just be what you need to reverse the effects of the symptoms. Are you experiencing frustrating menopausal symptoms that traditional exercise routines just can't seem to alleviate? Imagine a method that could revolutionize your approach to managing ...

If menopausal symptoms are kicking your tail, this revolutionary Japanese Walking Method may just be what you need to reverse the effects of the symptoms.

femmefitalefitclub.com/revolutioniz... #japanesewalkingmethod #JWT #walking #walkingmethod #menopausefitness

1 0 1 0

Wrote a bash script that creates a very specific JWT for Apple OAuth's client secret parameter based on the Service ID, Team ID, Key ID, and PEM key. AMA

#JWT #OAuth2 #Apple

0 0 0 0
A new image from NASA’s James Webb Space Telescope of a portion of the Helix Nebula highlights comet-like knots, fierce stellar winds, and layers of gas shed off by a dying star interacting with its surrounding environment. Webb’s image also shows the stark transition between the hottest gas to the coolest gas as the shell expands out from the central white dwarf.

A new image from NASA’s James Webb Space Telescope of a portion of the Helix Nebula highlights comet-like knots, fierce stellar winds, and layers of gas shed off by a dying star interacting with its surrounding environment. Webb’s image also shows the stark transition between the hottest gas to the coolest gas as the shell expands out from the central white dwarf.

An absolutely incredible image from the James Webb Telescope of a portion of the Helix Nebula.

Well worth downloading the full image for a Zoom in.

science.nasa.gov/asset/webb/h...

#JWT #Astronomy

71 20 1 0
Preview
Décoder un JSON Web Token (JWT) sur Visual Studio Code ou Sublime T... Le JSON Web Token (JWT) permet l'échange sécurisé de jetons entre plusieurs parties. Ce dernier est composé de trois parties : un header, un payload et une signature. Un JWT est forcément chiffré. ...

A relire : Décoder un JSON Web Token (JWT) sur Visual Studio Code ou Sublime Text

blog.shevarezo.fr/post/2022/07/08/decoder-...

#json #sublimetext #vscode #jwt #microsoft @yokawasa

1 0 0 0