Session

Are you sure your access tokens are really secure?

You've read about OAuth 2.0 and decided to secure your web API using JWT access tokens. To implement this, you're likely relying on an open-source library to parse and validate these tokens, confident that your configuration will only accept tokens from your trusted issuer or token service.

But here's the real question: are you absolutely certain that your API only accepts access tokens issued by your service?

In this session, I’ll expose some shocking tricks that can bypass improperly configured token validation. You’ll see firsthand how easy it can be to fool your API if you’re not careful. But don’t worry, I’ll also walk you through how to write tests that ensure your application is protected against these exploits, keeping your data and users safe.

Wesley Cabus

Coding Architect, Coffee Enthusiast

Antwerpen, Belgium

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top