reading-notes

View the Project on GitHub Abu-laban/reading-notes

Authorization/Authentication

What header(s) are used in authentication and authorization

What is safe to put into a JWT

How are JWTs validated

The contents of the Header describe the cryptographic operations to the JWT data.

The payload is the central part of the JWT which contains verifiable security statements

Registered Claim Names

Public Claim Names

Private Claim Names

HS256 algorithm, which is short for HMAC-SHA256

RS256 signing algorithm, which is short for RSA-SHA256

Document the following Vocabulary Terms.

Role-based access control is a method of restricting network access based on the roles of individual users within an enterprise.

it is what the user is supposed to do in an organization, what are his/her duties.

(JSON Web Token (JWT) access tokens conform to the JWT standard and contain information about an entity in the form of claims. They are self-contained therefore it is not necessary for the recipient to call a server to validate the token.