473,392 Members | 1,359 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,392 software developers and data experts.

JWT with OAuth

7 Nibble
How to use JWT with OAuth?
Oct 12 '20 #1
2 3669
220 128KB
JWT (JASON Web Tokens) uses a digital signature, and I have found (the common use of) this to be insecure. Example: tokens can be intercepted.

OAuth (adding a defined protocol), if you use it with your own self-coded, custom, authentication scheme is much better, but in this case it's security depends upon your own addition to it.

How to use?
To maximize your security, you should code an addition to OAuth or you should one-time-pad encrypt your tokens. Example: Server-Side has a bank of OTPs (for that one single customer) and Client-Side has the same bank of OTPs. Supply the Client-Side directly (in-person) to your clients with your own coded custom installation software.
Use OAuth without a standard JWT (write your own) and use the OTP process as described above.
If you are looking into OAuth and (which can use) JWT then you might have need of, or interest in, security. The actual security is up to you and there is no commonly known encryption that even comes close to OTPs. Example: OTPs can not be mathematically or computationally broken down into a mathematical or computational process.
Oct 13 '20 #2
7 Nibble
This is really helpful thanks :)
Oct 16 '20 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

by: gollapudiramya | last post by:
Hi, Can any body help to create oauth sample webapplication in C#. I need the complete source code that should use oauth libraries.
by: oimenoi | last post by:
I am keep having the "No overload for method 'GenerateSignature' takes 9 arguments" problem. Can you please tell me what is wrong with this class. This code is the sample from the Oauth.net . I...
by: HaLo2FrEeEk | last post by:
I've been using a PHP Twitter library for months now to automatically repost news that I post on my site, to my site's Twitter. Recently though this stopped working, and I get an error back from...
by: Don Clemens | last post by:
Ok, so I downloaded a class online (OAuthBase.cs). Every time I plug it into my project, I am getting "The name 'HttpUtility' does not exist in the current context" error. I got this from the...
by: michaeldebruin | last post by:
Hello all, Any of you who knows how to establish a oAuth connection to an API using Silverlight? Any help or tips would be appreciated. Thanks in advance Michael
by: saikrishna123 | last post by:
-1 down vote favorite 1 Hii im doing linkedin oauth sign in using php. Im struck at getting details like phone number and date of birth from linkedin account.Im getting all other details. ...
by: AjayGohil | last post by:
What is OAuth in Web API?
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.