New answers tagged authentication
3
votes
Prevent unregistered users from accessing the system using JWT?
A scope is meant to be a collection of claims. For example, the profile scope could represent that a person's name, e-mail address, user Id, etc., are included as claims in the JWT. Curity.io actually ...
1
vote
How dangerous is storing sensitive information in LocalStorage?
Just an example of why it isn't a good idea
Really well explained at the beginning, just want to add an example to keep in your pocket.
Indeed, LocalStorage is not a good place in order to store ...
5
votes
How dangerous is storing sensitive information in LocalStorage?
The attack would take the form of javascript loaded from another domain, but executed in the target domains page.
ie I load a script from compromised.advertiser.com/adverts.js and it runs "read ...
Top 50 recent answers are included
Related Tags
authentication × 438security × 88
authorization × 72
rest × 56
api × 49
oauth2 × 45
jwt × 38
microservices × 29
web-applications × 28
design × 24
architecture × 22
login × 21
session × 19
api-design × 17
web-services × 17
asp.net-mvc × 17
oauth × 17
c# × 15
php × 15
mobile × 15
javascript × 14
asp.net × 13
web-development × 12
passwords × 12
http × 11