Session Details

All about JWT's

Regular Session

The design of many user-authentication systems have been impacted by the introduction of JSON Web Token technology. Learn why these tokens have caused a stir in the field of web security and also learn how to avoid two of the most common security attacks associated with their use. In this talk, we'll discuss the context of token-base authentication by contrasting it with traditional authentication systems. We will walk through the parts of a JWT and demonstrate how they work together to enhance security and provide simple user login management. Finally, We'll cover the two most common security vulnerabilities associated with token-based authentication and provide strategies to avoid them.
About

A software development conference in the Louisville, KY area on designed to cover all aspects of software development regardless of development stack.

Contact Us
Keep in Touch