Security Cryptography Whatever cover image

What do we do about JWT? with Jonathan Rudenberg

Security Cryptography Whatever

00:00

Navigating Token Sharing and Authentication Protocols

This chapter explores the intricacies of token sharing methods, including symmetric key sharing and signed tokens, while comparing authentication protocols like SAML and OIDC. The discussion emphasizes the need for innovative solutions to address the shortcomings of current systems and considers future possibilities for creating more effective authentication methods.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app