Why is JWT popular?

Why is JWT popular?

ByteByteGo

6 месяцев назад

285,874 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@TobiasSette
@TobiasSette - 03.01.2024 04:43

I missed an example showing how to not use JWT in sessions

Ответить
@nyantaro1
@nyantaro1 - 01.01.2024 09:13

Excellent video. What is the ideal way to authenticate and authorize these days?

Ответить
@siddhantkumarkeshri6990
@siddhantkumarkeshri6990 - 29.12.2023 21:09

thanks for explanation

Ответить
@siddhantkumarkeshri6990
@siddhantkumarkeshri6990 - 29.12.2023 21:04

informative

Ответить
@isophistchambers6694
@isophistchambers6694 - 28.12.2023 00:58

Thank you for this explanation

Ответить
@jizhang2407
@jizhang2407 - 20.12.2023 21:11

Amazing animation.

Ответить
@tinnick
@tinnick - 19.12.2023 02:39

As third party cookies are being deprecated in favor of FedCM, even with JWT we will not be able to implement SSO around mid 2024.

JWT can still be used for logins without SSO though.

Ответить
@sandipb
@sandipb - 10.12.2023 22:11

Important thing to remember, is that when an user logs out, the JWT is still usable. The log out process just removes it from client cookies/local storage. So unless the server application has implemented token blacklisting on logout, a malware can still use the jwt till it expires.

Ответить
@raj_kundalia
@raj_kundalia - 10.12.2023 08:19

Thank you!

Ответить
@falvegas511
@falvegas511 - 08.12.2023 19:58

WHY DO KILLER PUTIN'S SCIENTISTS HAVE ACCEESS TO JWT DATA??? Western Democratic Societies Spend $10 Billion+ and His Freak Show gets Free Access. What the Hell Good are Sanctions IF YOU DON'T PUNISH THE RUSSIAN PEOPLE?

Ответить
@user-fed-yum
@user-fed-yum - 08.12.2023 15:57

Don't use JWT. Its just overhead that serves no benefit and makes your life more complex. Spend your time on security hardening on your server. Crazy idea designed by clever people focused on their front end skills, with insufficient backend experience designing extremely secure systems.

Ответить
@animanaut
@animanaut - 07.12.2023 15:55

one antipattern i witnessed is to put stuff into the payload that would rather belong into a rest path. like a for example GET for a particular resource where the resource key/resource had to be provided via payload instead of rest path. there is potential for missuse like that too, not only security.

Ответить
@heribertingo789
@heribertingo789 - 06.12.2023 23:35

wow so much information /s

Ответить
@rasmusjensen8219
@rasmusjensen8219 - 06.12.2023 20:33

This is a good intro to JWTs. Although, I do think that JWT, oauth and oidc is being somewhat mixed together. JWT's does not necessarily provide authorization or authentication. JWT is just a standard for signing JSON claims.

Ответить
@mad_t
@mad_t - 06.12.2023 16:17

I still prefer custom access tokens to jwt.

Ответить
@Yorgarazgreece
@Yorgarazgreece - 06.12.2023 15:59

i always pronounced them jay double u tees. first time i am hearing joughts lol

Ответить
@saiki4116
@saiki4116 - 06.12.2023 15:58

Really clear, concise explanantion.

Ответить
@ToanTrancodeblog
@ToanTrancodeblog - 06.12.2023 13:01

Nice video

Ответить
@edblarney9456
@edblarney9456 - 06.12.2023 07:03

This is an absolutely amazing channel.

Ответить
@luis96xd
@luis96xd - 06.12.2023 05:19

Great video, everything was well explained, thanks!

Ответить
@punpompur
@punpompur - 06.12.2023 05:10

Couldn't agree more. Session management with JWT was a problem for me in a project because for one of the clients they wanted only one active session for a user.

Ответить
@neeleshsalian1912
@neeleshsalian1912 - 06.12.2023 02:19

It amazed me when I heard it is pronounced as "jot"

Ответить
@Applecitylightkiwi
@Applecitylightkiwi - 06.12.2023 01:29

V good

Ответить
@maratchardymov2690
@maratchardymov2690 - 05.12.2023 23:35

Nice video, but I'd love to see comparison with cookies, for example cookies are used as default session store in Rails and can be stateless as JWT

Ответить
@biomorphic
@biomorphic - 05.12.2023 23:12

You do assume that the token is generated server side, which is not always the case. If your client is a mobile app, then it is much better if you generate the token on the client. The mobile app generates a new token for every new call, signing the token with the private key. The token would then be verified with the public key. The pair (private/public key) is generated during the sign up/sign in process. The public key is stored on the server, the private key in stored on the device keychain. No replay attack is possible in this configuration. Implemented for two different apps, first time 6 years ago. Most people creates a server side token, which is not as secure, because you can steal the token. And generally this token expires after days, otherwise you would have to issue a new token, and maybe ask to relogin every day, which is really annoying.

Ответить
@Smoonwalkerm
@Smoonwalkerm - 05.12.2023 22:18

I don't like to enconde user data in JWT...specially if you have to send roles and permissions

Ответить
@ianokay
@ianokay - 05.12.2023 21:51

It doesn't make any sense to suggest hijacking is a failure of JWT ("vulnerable to theft") since it's just an access token (with verifiably authentic user information). Access tokens could be hijacked as well, so it's no better or worse than the alternatives as a Bearer token. ☝🤔

Ответить
@gus473
@gus473 - 05.12.2023 21:39

Really good, understandable explanation (plus your superior graphics)! Thanks! 😎✌️

Ответить
@sirinath
@sirinath - 05.12.2023 20:13

What do you use for these animations?

Ответить
@pif5023
@pif5023 - 05.12.2023 19:44

I still fail to understand the security part of JWTs. If they are sent as unencrypted headers and can be easily stolen why should we rely on them for user authentication and by consequence for authorization?

Ответить
@rishiraj2548
@rishiraj2548 - 05.12.2023 19:42

Thanks

Ответить
@invisibleinvisible83
@invisibleinvisible83 - 05.12.2023 19:41

Thank you so much for this video🙏🏻

Ответить