The Parts of JWT Security Nobody Talks About | Philippe De Ryck, Google Developer Expert

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 มิ.ย. 2024
  • Join the "Full Stack Developers Israel" future meetups @ www.meetup.com/full-stack-deve...
    JSON Web Tokens (JWT) have become the de facto standard to transfer application claims between the client and the server. By design, they incorporate the use of signatures to ensure the integrity of the data. However, merely signing the data alone is not enough to guarantee security.
    In this talk, we zoom into the security properties of JWTs. After introducing the different signature schemes, we dive into the hard parts nobody talks about. How do you manage and identify the keys used for the signature? How do you handle key rotation? And what about encrypting JWTs? This talk answers all these questions. You will walk away with a set of best practices for adequately securing JWTs.
    Philippe De Ryck is the founder of Pragmatic Web Security, where he travels the world to train developers on web security and security engineering. He holds a Ph.D. in web security from KU Leuven. Google recognizes Philippe as a Google Developer Expert for his knowledge of web security and security in Angular applications.
    video production: מדיה'לה | Mediale
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 36

  • @hnasr
    @hnasr 4 ปีที่แล้ว +59

    My god I learn so much from this talk! Loads of information and the presenter is knowledgeable!

    • @gjuoun
      @gjuoun 4 ปีที่แล้ว +5

      Unbelievable!
      I followed after watched your JWT crash course!

    • @prashanttiwari120
      @prashanttiwari120 3 ปีที่แล้ว +1

      Hi Hussie, great to see your comment here

    • @philippec4448
      @philippec4448 2 ปีที่แล้ว

      You here, how am I not surprised !? By the way I really enjoy your videos, I’ve learned so much from them. Keep up the good work !

  • @Deebool
    @Deebool 3 ปีที่แล้ว +2

    Very clear and detailed yet concise. Thanks you very much!

  • @dmytroshchotkin2939
    @dmytroshchotkin2939 4 ปีที่แล้ว +3

    Thanks, SIr.
    It's a very good explanation!
    Indeed, very clear!

  • @hectormejia499
    @hectormejia499 3 ปีที่แล้ว +3

    Holy crap, JWTs are insanely complex, very good talk! Also scares me that this is the defacto method for "simple and secure" authentication in most APIs.

  • @CodeDoctorJet
    @CodeDoctorJet 4 ปีที่แล้ว +3

    Excellent preso. As AppSec professionals we need these kinds of prescriptive information for our developers. I'll definitely be sharing the cheat sheet and recommending more use of things like key IDs rather than just basic jwt sharing. Good stuff.

  • @dsebastien
    @dsebastien 5 ปีที่แล้ว +3

    Great presentation, thanks for sharing!

  • @robertodiana5821
    @robertodiana5821 4 ปีที่แล้ว +4

    the title maintains the promises

  • @philippec4448
    @philippec4448 2 ปีที่แล้ว

    Awesome video ! So much to take from it. Thx for sharing it.

  • @codefarm0
    @codefarm0 3 ปีที่แล้ว

    Super awesome. Tons of cool information. Thanks :)

  • @manojlasantha8499
    @manojlasantha8499 3 ปีที่แล้ว +1

    Great talk ! I learnt a lot from the talk.

  • @Pownas89
    @Pownas89 2 ปีที่แล้ว

    Still a Really good talk where I’ve learned a lot and got a lot of the info confirmed from what others haven’t explained fully. Thanks for a good informative video! 😊

  • @amitparks
    @amitparks 3 ปีที่แล้ว

    One of the best on JWT , JWS...

  • @ILyaCyclone
    @ILyaCyclone 3 ปีที่แล้ว +1

    Superb talk, sir!

  • @MosheEshel
    @MosheEshel 2 ปีที่แล้ว

    Excellent talk, I learned a lot of new things.

  • @KunalMukherjee3701
    @KunalMukherjee3701 3 ปีที่แล้ว

    Excellent power packed talk

  • @tommasoborgato
    @tommasoborgato 3 ปีที่แล้ว

    Great talk .... learned a lot of new stuff

  • @liferajib
    @liferajib 3 ปีที่แล้ว

    Best talk on JWT

  • @HenrryPires
    @HenrryPires 3 ปีที่แล้ว +1

    Thanks, amazing talk

  • @scottsmyth3251
    @scottsmyth3251 3 ปีที่แล้ว +1

    super helpful thanks

  • @Tidaltwist
    @Tidaltwist 4 ปีที่แล้ว +5

    It'd have been helpful if there were timestamps for each part. But great talk though.

  • @ivanmirandastavenuiter6176
    @ivanmirandastavenuiter6176 3 ปีที่แล้ว +1

    Really good talk on JWTs. Really interesting topics. But why the questions weren't added to the video?? Anyway, great!

  • @stokitko
    @stokitko 2 ปีที่แล้ว

    Thanks, you refined a lot for me. Guess what, I made an error when during validation of JWT doesn't checked an issuer with expected. It's funny because I had a hesitation to check it but was too busy by implementing sig verification. Thank you again, you saved billions (I hope) of my future users :)

  • @javadhosseini7524
    @javadhosseini7524 4 ปีที่แล้ว

    thanks for your great video. I have a question. Is it good to store a jwk into a json file?

    • @philippederyck2572
      @philippederyck2572 4 ปีที่แล้ว +1

      Sure, it all depends on how that JWK is used. OpenID Discovery points to a JSON file containing the identity provider's keys ...

  • @Cdswjp
    @Cdswjp 2 ปีที่แล้ว

    Is symmetric signing ever preferred over asymmetric signing?

  • @metalbroga
    @metalbroga 4 ปีที่แล้ว +3

    i have a question that is related to “renewing” jwt, like those apps that never logs you out (like Facebook, instagram)?

    • @Deebool
      @Deebool 3 ปีที่แล้ว

      I wonder about that part too (and security issues that goes along) !

    • @Rheenen
      @Rheenen 3 ปีที่แล้ว +1

      to renew an accesstoken, you send the expired accesstoken + refreshtoken, validate, and send back a new accesstoken if validation was ok. If not, then don't send back new access token.

    • @metalbroga
      @metalbroga 3 ปีที่แล้ว

      @@Rheenen Thanks for the clarification

  • @j-tech9156
    @j-tech9156 2 ปีที่แล้ว

    Got a lot

  • @SM-ok3sz
    @SM-ok3sz 2 ปีที่แล้ว

    Good talk but holy crap is that pointing device annoying.

  • @mr.RAND5584
    @mr.RAND5584 3 ปีที่แล้ว

    it is like md5 can be decoded public in their website jwt; just put the token their and it will give information;

  • @alvis7574
    @alvis7574 3 ปีที่แล้ว

    JWT is basically a digital envelope encrypted with some symmetric encryption algorithm. Could it secure your payload? Maybe. Could that be a problem for a hacker? Nope.