Комментарии:
Cyber security tip: don’t show your real identity card or badge online. Respectfully suggested.
Ответитьthis vieo is just perfect <3. On Point. The main idea is so well explaned with the example that i had no issue to transfer that newly gained knowledge to my study session concerning the jwt.
Love it men!!!!
Greetings from germany and thanks for this video. i appreaciated it a ton :)!!!!!!!!!!!!!!
I think what is hard to understand, is that you do not need the secret key for the server side validation of the token, if I'm right. Otherwise there would be no difference to using session.
ОтветитьI would say this is probably the best explanation I have seen.
Ответитьthank you so much for this explantion! I searched JWT today since I keep forgeting how JWT works, after watching your video i think i will never forget it
ОтветитьA good analogy, thanks.
From what I understand a valid jwt sent by the user's browser allows access to various restricted web pages on an app. Therefore, if the jwt is stolen somehow then the thief will also have access. How likely is this and will possession allow full access without any other checks on the user?
This is really a very interesting content
ОтветитьGreat analogy to teach the concept of JWT authentication!
ОтветитьThis was actually a really helpful analogy. thank you for sharing!
ОтветитьThank you! The analogies really helped!
ОтветитьThank you - that was invaluable !
ОтветитьGlad you could help me understand JWT better. Thanks
Ответитьthank you so much for this very smart analogy Matt! you certainly made a difference to my understanding and you got yourself (at least) one more subscriber (as I am going to share this video with my bootcamp's cohort).
ОтветитьGreat explanation, thanks a lot!
ОтветитьI really loved the example you used in this video. Thank you for explaining it in such a clear and relatable way 👍
ОтветитьThanks for the examples, helped understand better
ОтветитьVery nice explanation
ОтветитьThanks a lot. It was helpful for me.
Ответитьthanks for the explanation. can you please do a video on User Impersonation using Identity/JWT with an example in .NET. I am unable to understand how this going to work when token is generated already. Sorry if question is dumb.
Ответить