JWT, OAuth, and Algorithm Choices
Tue, 27 Feb 2018

Implementing systems that securely authenticate users and authorize their activities within applications can involve multiple interactions that cross trust boundaries. When applications are written in different languages, live in different environments, but still want to share data with each other what are the options?

  • Don't start rolling your own crypto …