Forem

# jwt

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fast API, JWT auth module
Cover image for Fast API, JWT auth module

Fast API, JWT auth module

Comments
8 min read
Week 18: JWT, Security, and Breaking My Own Auth System

Week 18: JWT, Security, and Breaking My Own Auth System

Comments
4 min read
We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.
Cover image for We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.

We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.

3
Comments
5 min read
Part 7 — Token Revocation Without Killing Performance

Part 7 — Token Revocation Without Killing Performance

Comments
6 min read
Part 3 — Inside the Auth Service: From Token Validator to Policy Decision Point

Part 3 — Inside the Auth Service: From Token Validator to Policy Decision Point

Comments
6 min read
How EdDSA JWTs Solve the Agent Credential Problem

How EdDSA JWTs Solve the Agent Credential Problem

Comments
4 min read
JWT verification in production: an 8-check field guide
Cover image for JWT verification in production: an 8-check field guide

JWT verification in production: an 8-check field guide

4
Comments
5 min read
Scalar Setup ASP.NET Core Web API
Cover image for Scalar Setup ASP.NET Core Web API

Scalar Setup ASP.NET Core Web API

5
Comments 1
1 min read
How to decode and debug a JWT without installing anything

How to decode and debug a JWT without installing anything

Comments
5 min read
Three JWT bugs that ship to prod silently — and the 5-line CI test that catches them
Cover image for Three JWT bugs that ship to prod silently — and the 5-line CI test that catches them

Three JWT bugs that ship to prod silently — and the 5-line CI test that catches them

3
Comments
6 min read
I Audited 12 Open Source Projects' JWT Implementations and Found the Same 6 Mistakes in All of Them
Cover image for I Audited 12 Open Source Projects' JWT Implementations and Found the Same 6 Mistakes in All of Them

I Audited 12 Open Source Projects' JWT Implementations and Found the Same 6 Mistakes in All of Them

Comments
9 min read
Authentication in MERN Apps: JWT, bcrypt, Redis, and OAuth2
Cover image for Authentication in MERN Apps: JWT, bcrypt, Redis, and OAuth2

Authentication in MERN Apps: JWT, bcrypt, Redis, and OAuth2

Comments
10 min read
JWT security mistakes that will get you breached
Cover image for JWT security mistakes that will get you breached

JWT security mistakes that will get you breached

Comments
4 min read
I Wrote a JWT Verifier in 150 Lines. You Probably Shouldn't — But Here's What I Learned.

I Wrote a JWT Verifier in 150 Lines. You Probably Shouldn't — But Here's What I Learned.

Comments 1
9 min read
Warmed Permission Cache: Speed, Security, and the Real Trade-Offs
Cover image for Warmed Permission Cache: Speed, Security, and the Real Trade-Offs

Warmed Permission Cache: Speed, Security, and the Real Trade-Offs

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.