Authentification progression
✅ API key
- User issues API key
- To use certain API, send key with request
- When requested, Application authenticated user information with key
- Respond to user with information from key
👎🏻
- If key is leaked? Difficult to fix
- To prevent key leak, frequent update neccessary
✅ OAUTH2
- Application sends user to Oauth service to login
- Oauth authenticates user
👎🏻
- need to verify token
- token expires
✅ JWT
JWT carries verification with itself, so no need for requesting for verification of the token
👎🏻
- token carries lots of sensitive data
This post is licensed under CC BY 4.0 by the author.