Authentication and Authorization

  • Calles M
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… 8. Avoid using weaker algorithms like MD5 9 and SHA-1 10 that someone can easily break. 11 … 18. Avoid keeping the token longer than needed. Verify the JWT algorithm matches the desired algorithm and avoids accepting the “none” algorithm. 19 …

Cite

CITATION STYLE

APA

Calles, M. A. (2020). Authentication and Authorization. In Serverless Security (pp. 229–256). Apress. https://doi.org/10.1007/978-1-4842-6100-2_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free