… 8. Avoid using weaker algorithms like MD5 9 and SHA-1 10 that someone can easily break. 11 … 18. Avoid keeping the token longer than needed. Verify the JWT algorithm matches the desired algorithm and avoids accepting the “none” algorithm. 19 …
CITATION STYLE
Calles, M. A. (2020). Authentication and Authorization. In Serverless Security (pp. 229–256). Apress. https://doi.org/10.1007/978-1-4842-6100-2_9
Mendeley helps you to discover research relevant for your work.