
What do we do about JWT? with Jonathan Rudenberg
Security Cryptography Whatever
00:00
Navigating Token Sharing and Authentication Protocols
This chapter explores the intricacies of token sharing methods, including symmetric key sharing and signed tokens, while comparing authentication protocols like SAML and OIDC. The discussion emphasizes the need for innovative solutions to address the shortcomings of current systems and considers future possibilities for creating more effective authentication methods.
Transcript
Play full episode