reading-notes

this repo will contain my reading during the course .

View on GitHub

Authorization/Authentication

img1

What header(s) are used in authentication and authorization

The HTTP Authorization request header contains the credentials to authenticate a user agent with a server, usually, but not necessarily, after the server has responded with a 401 Unauthorized status and the WWW-Authenticate header.

What is safe to put into a JWT

How are JWTs validated

We strongly recommend that you use middleware or one of the existing open source third-party libraries to parse and validate JWTs. At JWT.io, you can find libraries for various platforms and languages, such as .NET, Python, Java, Ruby, Objective-C, Swift, and PHP.

Term Def
RBAC Role-based access control (RBAC) restricts network access based on a person’s role within an organization and has become one of the main methods for advanced access control. The roles in RBAC refer to the levels of access that employees have to the network.
User Roles The Professional Archive Platform contains five standard Roles. These Roles can be assigned to Users as-is, or they can be duplicated and modified to meet your organization’s specifications. Custom Roles can also be created.
JWT Token JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA.