Search Results for: JSON web tokens
You searched for JSON web tokens - DevOps.com
How to Secure Your Microservices Architecture With JSON Web Tokens
JSON Web Tokens (JWTs) encapsulate authorization data in a portable, stateless manner. But what happens when a request arrives at a context boundary such as an API gateway fronting microservices? In this ...
Best of 2021 – How to Revoke JSON Web Tokens (JWTs)
As we close out 2021, we at DevOps.com wanted to highlight the most popular articles of the year. Following is the seventeenth in our series of the Best of 2021. One of ...
How to Use Application Load Balancer and Amazon Cognito to Authenticate Users for Your Kubernetes Web Apps
This post describes how to use Amazon Cognito to authenticate users for web apps running in an Amazon Elastic Kubernetes Services (Amazon EKS) cluster ...
Session Tokens Vs. JWTs: Choosing Your Session Management Solution
In the world of authentication today, session tokens and JSON Web Tokens (JWTs) are the two most popular ways to manage user sessions and maintain a user’s authentication state between calls. Impassioned ...
Web Application Security is not API Security
Do you follow the same procedures to secure a web application as you do an API? Is there a difference between the two? We’ve spoken about API security quite a bit in ...
Okta Offers PASETO as Alternative to JSON Tokens
Okta today launched an open source library for using Platform-Agnostic Security Tokens (PASETO) as an alternative to JSON Web Tokens (JWT) to authenticate end users. Randall Degges, head of evangelism for Okta, ...
Helping Developers Build Secure APIs From the Start
Developers are already tasked with creating and managing APIs; they must also be empowered to secure them easily ...
API Gateway Vs. Service Mesh: What’s the Difference?
In the average microservices architecture, app programs trade the stability and rigidity a call stack offers for the network’s flexibility. Consequently, latency, security and traceability issues that were previously absent become a ...
Use the OWASP API Top 10 to Secure Your APIs
The tools, languages, platforms, and methods used to build applications have changed drastically over the past decade. Application security practices have to change with them; otherwise, security professionals will be playing constant ...
Survey Surfaces Lots of Edge Computing Diversity
A global survey of 1,652 published today by Eclipse Foundation suggests a flood is lifting all platform boats as IT organizations begin to build and deploy a wide range of edge computing ...
Securing Software with Intelligent Pipelines
One of the biggest cybersecurity risks involves vulnerabilities in the application layer. After all, the best firewall is useless if the web application itself is vulnerable. Many companies have worked to mitigate these ...
Authentication in Serverless Apps—What Are the Options?
Serverless applications are growing in popularity among DevOps engineers. They provide a convenient, predictable way to run simple processes like CI/CD builds or automation scripts with no need to stand up infrastructure ...