Skip to content

Latest commit

 

History

History
23 lines (15 loc) · 735 Bytes

File metadata and controls

23 lines (15 loc) · 735 Bytes

Reading notes for class 9 of 401

Authorization / Authentication

What header(s) are used in authentication and authorization

The Authorization and Proxy-Authorization request headers contain the credentials to authenticate a user agent with a (proxy) server.

What is safe to put into a JWT

A secret, a token, username, and password that are all encrypted.

How are JWTs validated

Using a decoder and jwt.verify()

Vocab

RBAC

  • Role-based access control is a way of restricting network access based on the roles of individual users

User Roles

  • Allows certain users to have permissions when performing CRUD methods

JWT

  • JSON Web Tokens are used to share security information between two parties