Authentification progression
β API key
- User issues API key
- To use certain API, send key with request
- When requested, Application authenticated user information with key
- Respond to user with information from key
ππ»
- If key is leaked? Difficult to fix
- To prevent key leak, frequent update neccessary
β OAUTH2
- Application sends user to Oauth service to login
- Oauth authenticates user
ππ»
- need to verify token
- token expires
β JWT
JWT carries verification with itself, so no need for requesting for verification of the token
ππ»
- token carries lots of sensitive data
This post is licensed under CC BY 4.0 by the author.