Skip to main content

Questions tagged [tokens]

1 vote
1 answer
300 views

By saving the RefreshToken in an HTTP-only cookie it cannot be accessed or manipulated by JavaScript, but will be sent with each request with a greater risk of being intercepted. When saving the ...
Bruno Nobre's user avatar
2 votes
3 answers
1k views

I'm quite new to the world of access and refresh tokens, so bear with me. Client uses its refresh token to get a new access token. The server invalidates the just used refresh token and contextually ...
Fabio A.'s user avatar
  • 125
1 vote
4 answers
752 views

In a web application with a frontend and a backend part, how exactly is the cancellation token mechanism implemented over HTTP? HTTP is a stateless protocol and it does not allow "sharing" ...
Val's user avatar
  • 177
1 vote
0 answers
642 views

I'm currently trying to build a very simple application for handling OpenID Connect using the library Openiddict. This library lets me construct the access_token and the id_token and lets me set which ...
Inx51's user avatar
  • 313
0 votes
2 answers
174 views

I have a scenario I am considering, and I don't quite find out what's the best solution with OAuth. Hopefully I can learn good things here. We are company A and we specialize in managing secure text ...
diegosasw's user avatar
  • 407
1 vote
3 answers
870 views

A good auth system contains access and refresh tokens. I know what access-tokens are for and I know what refresh tokens DO - but I don't understand their meaning. For example: If I authenticate myself ...
Bamba675's user avatar
0 votes
1 answer
1k views

Background I am building a web app that allows the user to integrate with multiple services like Google, Twitter, Github etc. using OAuth2.0. Currently, I retrieve the refresh token on sign-in to ...
shoaib30's user avatar
  • 101
15 votes
3 answers
4k views

I'm wondering how to effectively test a lexer (tokenizer). The number of combinations of tokens in a source file can be huge, and the only way I've found is to make a batch of representative source ...
SuperJMN's user avatar
  • 453
1 vote
1 answer
2k views

We have a Web server (which also does authentication and authorization) that manages, via an API, one or more servers that contain highly sensitive data. In the below architecture diagram, we manage ...
Matthew Knill's user avatar
-2 votes
1 answer
236 views

I have seen tokens like this: var message = "Hello, {Name}"; and like this: var message = "Hello, ${name}"; and like this: var message = "Hello, @NAME"; and a few ...
1.21 gigawatts's user avatar