Skip to main content

Questions tagged [client]

In a client-server model, the server serves services to the client.

2 votes
2 answers
136 views

Pardon if this is meant to be obvious. As I understand it, the point of PKCE is to mitigate client-side credential hijacking by giving the auth server a way to distinguish legitimate client-side ...
ithmath's user avatar
  • 23
1 vote
1 answer
359 views

As part of TLS1.3 handshake client hello sent containing the TLS1.3 version support as part of suppored_versions extension, consider if as part of server hello supported_versions extension is not ...
hjhjh's user avatar
  • 51
0 votes
0 answers
147 views

Can I setup and enforce additional WiFi connection (and password) requirements on managed laptops using Windows or MacOS? Such as: blocking (or entirely hiding) the option to connect to open networks ...
Bob Ortiz's user avatar
  • 7,725
2 votes
1 answer
1k views

I've read about this but I don't fully understand how to choose. I have two options: Public client "A native, browser or mobile-device app. Cognito API requests are made from user systems that ...
BigMistake's user avatar
0 votes
1 answer
778 views

I see why it is obviously bad to store a secret key and client ID in the source code for a web application. However, how do you go about the alternative? Surely, that information has to be stored ...
BigMistake's user avatar
0 votes
1 answer
567 views

Is there any way to reliably identify the referring site on modern browsers (not considering manual HTTP requests outside of a browser e.g. cURL, etc.)? Referrer header will not work because the ...
Adam Thompson's user avatar
0 votes
2 answers
163 views

How would you enforce user PC to only connect to a given network? Answers need to be OS agnostic. One weak solution could be to set client-side firewall rules to only allow communications with ...
Erwan's user avatar
  • 213
1 vote
2 answers
879 views

For sending soap messages to a webservice we need to include a client authentication certificate with these messages. Normally we simply created a self signed client auth. certificate (with as a ...
user2713516's user avatar
0 votes
1 answer
3k views

I am trying to understand how client certificate authentication works in an SSL handshake. Can someone help to clarify the following bullet points below: Do we need to have a Client Leaf certificate ...
rizwan's user avatar
  • 103
2 votes
1 answer
201 views

If I own a software and I want to conduct a pen test with pen testers, should I define the scope or do the pen testers assess the software first and they define the scope? How does scope definition ...
ethicalhacker's user avatar
0 votes
0 answers
206 views

Taking the concept from the Gemini protocol that allows clients to identify themselves using their own self-signed certificate - is this a valid concept that could be used in other protocols and what ...
LittleBobTable's user avatar
3 votes
1 answer
158 views

I'm writing a python application that will do some operations that will require root privileges. Instead of asking for user password every time i decided to use server client model. A python script ...
Thenujan Sandramohan's user avatar
1 vote
1 answer
583 views

I'm building an app that uses Braintree for processing payments. According to the documentation, I need a server-side endpoint that returns the clientToken, which is then used to manage a user's vault ...
David Bryant's user avatar
1 vote
1 answer
2k views

If a wildcard certificate is provisioned for *.domain.fqdn, and has Client Authentication as a defined usage, does this mean the certificate can be used to essentially impersonate any domain machine? ...
SmithPlatts's user avatar
0 votes
1 answer
440 views

When a HTTPS connection with a client certificate request is done, the client sends a CertificateVerify message with his public certificate so the server can verify that the client has a valid private ...
pauet's user avatar
  • 3

15 30 50 per page
1
2 3 4 5
9