Nowadays, there are lots of services that require you to set up, use and remember a password. How should you handle all of them? And what if you also wanted to secure your uploaded files and keep them away from prying eyes?
Tag: Cybersecurity
Authentication may be a scary and delicate topic, since dealing with it involves diving into the security details of an application. There are various ways for dealing with authentication, such as HTTP BASIC AUTHENTITCATION, OAuth 1.0, OAuth 2.0, etc. However recently I came across JWT (JSON Web Token), so here we will see how these tokens work.