Plan du cours
Introduction
- Aperçu de la structure des JWT
- Cas d'utilisation courants des JWT
Validation des JWT
- Signature d'un jeton symétrique
- Signature asymétrique du jeton
- Validation des jetons
- Validation des créances
JWT volés
- Gestion des JWT volés
- Stockage des JWT
- Invalidation des JWT
Gestion d'une clé cryptographique
- Aperçu des clés secrètes
- Intégrer la clé publique
- Intégrer une URL contenant la clé
Piratage des JWT
- Approche par la force brute
- Modification de l'algorithme RS256 en HS256
- Approche sans algorithme
Résumé et prochaines étapes
Pré requis
- Connaissance de base des services web
Audience
- Développeurs
Nos Clients témoignent (5)
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.
Lakshmipriya Sivakumar - Deque Systems Inc
Formation - Spring Boot, React, and Redux
I like the professionality of the trainer, he really knows what he is talking about and able to explain almost even the simple subjects on the topic which is great.
Marlon - National Confederation of Cooperatives
Formation - React with Next.js
trainer very knowledgeable clear classes explains the importance of learn the topic gives enough background on topic
Li Fang Bren Ong - DBS Bank Limited
Formation - Ant Design
J'ai beaucoup appris sur le sujet
Zsolt Langviser - Accenture Industrial SS
Formation - NestJS: Beginner to Advanced
Traduction automatique
The labs were interesting and probably the most useful learning tool to me. Anything I missed or forgot about was relearned or reinforced in the labs.