Session vs Token Authentication in 100 Seconds

  Рет қаралды 1,017,865

Fireship

Fireship

Күн бұрын

Learn the difference between session and token-based authentication on the web. Master Web Security in 12 weeks 👉 websecurity-academy.com/?aff=... Enroll before the deadline on 31st Oct (Saturday).
#web #security #100SecondsOfCode

Пікірлер: 372
@lolllolol5416
@lolllolol5416 3 жыл бұрын
I am actually suspicious if you are creeping on my search history, 3 times in a row you gave me what I wanted to understand the next day.
@luxunited5449
@luxunited5449 3 жыл бұрын
I didn't even searched for something like this, just thought of it...
@sarcasm1015
@sarcasm1015 3 жыл бұрын
KZfaq algorithm at its finest
@naniy143
@naniy143 3 жыл бұрын
Universe at work.
@jimhalpert9803
@jimhalpert9803 3 жыл бұрын
Real
@ansadahmad1958
@ansadahmad1958 3 жыл бұрын
You mean this channel uploaded the video right after you were searching for it in google?
@princesharzeel8237
@princesharzeel8237 3 жыл бұрын
Fireship is on fire with regular uploads.
@AreyHawUstad
@AreyHawUstad 3 жыл бұрын
This one looked sponsored. But who cares, Jeff explained me JWT in 100 seconds which I had been struggling to understand since a few months now.
@aladdinovich
@aladdinovich 3 жыл бұрын
I became addicted to this channel, I feel it is like my daily injection that I can't live without.
@hampuswestman8722
@hampuswestman8722 3 жыл бұрын
Knowledge is a hell of a drug
@fadilrahadiansyah4223
@fadilrahadiansyah4223 3 жыл бұрын
yes you're goddamn right
@soumyajitdey5720
@soumyajitdey5720 3 жыл бұрын
Absolutely true. It's the same for me too🔥
@graf_tec
@graf_tec 2 жыл бұрын
Me too
@Evoleo
@Evoleo 2 жыл бұрын
SQL injection
@ZyncInteractive
@ZyncInteractive 3 жыл бұрын
Every-time I see one of these new 100 seconds of something video show up in my playlist, brightens my day a little more. Thank you for producing great content!
@michalurban8536
@michalurban8536 3 жыл бұрын
You make the highest quality programming videos on youtube, great job!
@mwimb6716
@mwimb6716 2 жыл бұрын
I 100% agree with this
@fieryscorpion
@fieryscorpion 11 ай бұрын
This guy doesn’t know shit.
@KanagawaMarcos
@KanagawaMarcos 3 жыл бұрын
Man, you way of teaching "something in 100 seconds" is awesome. I'll try to do the same in my work with juniors, you're in inspiration!
@davedurkee8853
@davedurkee8853 5 ай бұрын
Your juniors can get the info here. Give them a bit more than 2 minutes. They will appreciate it.
@CodingWithLewis
@CodingWithLewis 3 жыл бұрын
I love that in the video you never gave a reason as to why one was better than the other. Cyber Security is a field that is just constantly being evolved and I loved the explanation of both. JWT has been an incredible tool I've used for a while now and I will not go back. Always love the videos Fireship!
@miQize
@miQize 3 жыл бұрын
By far the clearest explanation I've seen. Well done!
@KBoB5arc
@KBoB5arc 2 жыл бұрын
I don't know how I could live so long without this channel
@estym_
@estym_ 3 жыл бұрын
That's a really quick yet good introduction to Session and Token Authentification, that no joke helped me have a better understanding of these authentification methods x) What about Redis in 100 Seconds for a future video?
@Fireship
@Fireship 3 жыл бұрын
Thank you. Good idea, I want to cover more DBs in this format.
@daheck81
@daheck81 3 жыл бұрын
@@edwardsmale3977 Redis is just a key value store which makes it extemely fast. Adding/reading/removing data works basically like the local/session storage in a browser. It’s mostly used for storing session or caching data.
@gaoalexander73
@gaoalexander73 3 жыл бұрын
With serverside sessions, its common to shove that data it into some external memory storage like redis. It frees up load on your database, plus that data doesn't need to be persistent anyways. And it keeps your api servers or w.e stateless, makes it easier to autoscale stuff while it sits behind a load balancer.
@yt-sh
@yt-sh 2 жыл бұрын
​@@Fireship hello there, do make RUST in 100 seconds and React state management in 100 seconds
@Spreadlove5683
@Spreadlove5683 2 жыл бұрын
@@Fireship At 1:40, what does it mean that web tokens "can't be used to authenticate a user in the background on the server"?
@osamaa.h.altameemi5592
@osamaa.h.altameemi5592 3 жыл бұрын
Man you are simply gifted in getting ur idea to the audience.
@DontBeMadBro
@DontBeMadBro 3 жыл бұрын
I love these 100s videos. You are on fire, literally
@tylerdurden2832
@tylerdurden2832 3 жыл бұрын
Your timing is perfect. I was studying this.
@raniathemri949
@raniathemri949 2 жыл бұрын
i am addicted to your content it is understandable simple and gives a general overview in few minutes so when i intend to learn something i come here first lots of thanks.
@ofrikirshen3071
@ofrikirshen3071 3 жыл бұрын
Yesterday I was crying myself to bed because of this, perfect timing :)
@mikemartin6748
@mikemartin6748 Жыл бұрын
You can also do token-based authentication with cookies. You just store the user id, expiry, and signature in 3 cookies or in 1 cookie with a separator and roll your own standard for concatenating the user id and expiry and hashing it to check the signature. In reality, JWTs are just a standard for doing exactly that.
@zedshockblade7157
@zedshockblade7157 Жыл бұрын
This i what i’m trying to figure out. If you store the jwt in a cookie/http only cookie. Is it still considered as token based auth? Or it is now cookie based auth?, Also if you indeed store the jwt in the cookie, how can you attach the jwt on the header as bearer token in your request?
@DarkWaffle56
@DarkWaffle56 Жыл бұрын
@@zedshockblade7157 cookies are sent automagically to any requests made to the specific server in which they were created, so you don’t need to include them in the headers manually
@igor9silva
@igor9silva Жыл бұрын
​@@zedshockblade7157 those are 2 separate things. Manually adding the SECRET (let's call it that, for now) to the Authorization header on every request versus storing it and as a cookie (and letting the browser automatically add the cookie header on every request) will achieve the very same goal. Now, there's the SECRET type. A "session" is a token you generate and store in memory or disk storage. You have to check the user sent SECRET through a list of valid sessions every request. The "token" is signed using a hashing algorithm, so you can mathematically prove you are the one who created the token (and not someone else). That way, you don't have to go through a list, you just trust it. One con of the that last approach is that you can't revoke a token (by removing it from the valid tokens list). That feature can be important in some systems (e.g. revoke every user session when he changes the password).
@TheFeljoy
@TheFeljoy Жыл бұрын
@@igor9silvaThis is the correct answer. How you transfer the data (cookie or header) is not really important for how the validation works. Also really good tip about revoking access control👍
@Vichion
@Vichion Жыл бұрын
​@@igor9silvacouldn't you just use a UUID for every device for this method? So you concat and hash user id, username and the device uuid, if that token doesn't match one stored on the server then access denied...
@ytsharmahandle
@ytsharmahandle 3 жыл бұрын
just love all your high quality and super informative videos 🤩
@lwinklly
@lwinklly 7 ай бұрын
Finally an authentication video that pronounces JWT correctly
@JosephLuklukkyjoe
@JosephLuklukkyjoe 3 жыл бұрын
please make a video on CORS please! I think it's one such topic where others watch 10 videos on it and still don't get it but you knock it out the park with one 100 sec video.
@felixdeiters7518
@felixdeiters7518 Жыл бұрын
kzfaq.info/get/bejne/arF4nLalldWwemQ.html
@pranavbakare8922
@pranavbakare8922 3 жыл бұрын
Addiction to small video with effective understanding!!!!!
@googleuser9422
@googleuser9422 3 жыл бұрын
Thank you! I was needing this
@whonayem01
@whonayem01 2 жыл бұрын
i love your 100 seconds series. want more videos
@GaneshGfx
@GaneshGfx 3 жыл бұрын
I'm literally thinking thinking about Token, Thanks for this Video 👍
@NNNedlog
@NNNedlog 2 жыл бұрын
While watching this, I got a notification of your video "C++ in 100 seconds". Do immediately I finish this, I'll head over to the new video
@DrJimmyBob
@DrJimmyBob 3 жыл бұрын
I actually love this channel
@mohamadrezamotaghi7427
@mohamadrezamotaghi7427 2 жыл бұрын
The best explanation on these stuff.
@saiddope2241
@saiddope2241 2 жыл бұрын
omg thank u for the simple and easy to understand way to explain things
@ShilohFox
@ShilohFox 7 ай бұрын
Absolutely wonderful explanation! Thank you for this video :)
@danielbrambila7018
@danielbrambila7018 3 жыл бұрын
Love your vids, super clear super fast hehe
@johnhopkins4752
@johnhopkins4752 3 жыл бұрын
Bro I need a “Whatever the heck i needed to know in order to understand this” in 100 seconds
@yt-sh
@yt-sh 4 ай бұрын
Thank you for making this video!
@XoLucyna
@XoLucyna 2 жыл бұрын
It was really great and quick video but i've got some questions, when the server creates the session in the database does few or some services creates an expire time? like can the session be expired or invalid after 1 hour or after the defined amount of time? or sessions don't have any expire rate?
@Flynn1411
@Flynn1411 3 жыл бұрын
Your videos are superb!!
@jbraat
@jbraat 3 жыл бұрын
Your videos are great. Thanks dude.
@huh_wtf
@huh_wtf 3 жыл бұрын
this was ao perfectly timed for.me...i actually came for a video like this
@nothingnoone8752
@nothingnoone8752 3 жыл бұрын
Dang this channel is _really_ good.
@brucewayne2480
@brucewayne2480 3 жыл бұрын
I use both at the same time : tokens to make front end independent from backend logic and sessions to store refresh tokens for each issued token and tracking sessions' number
@JordanPlayz158
@JordanPlayz158 Жыл бұрын
Interesting, I permit both so I don't need to make a frontend and backend api, feels like it just needlessly complicates things, couldn't find any articles about pros and cons of doing this? Is there any benefit, if so I'd be greatful if someone can let me know
@tyc00n
@tyc00n 3 жыл бұрын
underrated topic but very important
@nabiisakhanov3522
@nabiisakhanov3522 3 жыл бұрын
Hooray new video!
@macoshev9774
@macoshev9774 3 жыл бұрын
The best channel !
@Jordan-er9bx
@Jordan-er9bx 3 жыл бұрын
Please can you do a longer video on JWTs
@JanasV
@JanasV Жыл бұрын
What's a better form of authentication and authorization? Preferably one that can be implemented in Java or Spring Framework
@FalseDev
@FalseDev 3 жыл бұрын
Oh yeah, thanks Jeff!
@Alex-uf2ie
@Alex-uf2ie 3 жыл бұрын
What vscode for js does Fireship use in their tutorials?
@gabrielpfgm
@gabrielpfgm 2 жыл бұрын
Would love to see content on DPoP and mTLS
@nodidog
@nodidog 3 жыл бұрын
I think your audio would benefit from a de-esser plugin. Great video as usual, though 👍
@Penguinz-fr1mu
@Penguinz-fr1mu 3 жыл бұрын
I was just wondering this today omg!
@S3Kglitches
@S3Kglitches Жыл бұрын
You should talk about that tokens and cookies stored privately from other websites etc. this would explain how an attacker can hijack the JWT - basically only copy it from the machine physically (except man in the middle attack where he can read HTTPS traffic)
@sagnikpradhan3594
@sagnikpradhan3594 3 жыл бұрын
Needed longer version for this
@danko95bgd
@danko95bgd 3 жыл бұрын
Can you make a video on casbin (authorization policy) lib. It's available in many languages and it would be nice if you could explain it, maybe even create few routes for demonstration.
@basira7580
@basira7580 3 жыл бұрын
Nice content as always :D!
@metallicadead
@metallicadead Жыл бұрын
Ha, funnily enough i’m currently in the middle of creating a mock shopping site coded with javaEE as a group project for school using JsessionId and running the Jdbc to access an SSMS database, and I was just wondering if there was another way to do identification to allow the management of a large amount of traffic. Perfect timing, KZfaq, and thanks, Fireship!
@TheScoobysteve
@TheScoobysteve 2 жыл бұрын
So I've been working in my first programmer job for about two months now. Anytime I have a 'Hello, World! ' moment the very first place I look is always these 100s explanations.
@Wakkyguy
@Wakkyguy 3 жыл бұрын
Can I get a link to the playlist of your background tracks?
@janoglezcampos
@janoglezcampos 3 жыл бұрын
Im storing the JWT token on cookies with some user info (an user ID basically) on the service im developing, do you think that's secure enough?
@igor9silva
@igor9silva Жыл бұрын
I do sessions so I can revoke them (kept on Redis cache, purged on revoke), but I do encapsulate it into JWT tokens so they can contain more (and signed, verifiable) data. As the transfer protocol, I do cookies 😅 best of both worlds.
@jackdavenport5011
@jackdavenport5011 10 ай бұрын
To me, using http only cookies is the better option. Not only are they automatically attached to every request, but they can’t be stolen with an XSS attack unlike using localstorage.
@marcinkarbowniczyn9226
@marcinkarbowniczyn9226 Ай бұрын
One question, can we say that using JWT is more stateless than using regular Tokens (like Django Tokens)? What I mean is, when we use regular Tokens we store them in the database. Every time there is a request with a Token in the header, we seek for it in the database and return a user connected to the Token. On the other hand, JWT may only store an ID of the user, so when the JWT is being sent, we decode it in our code and query for the User to the database. Do I undarstand the processes correctly? I also don't fully get it how JWT would be more efficient in larger apps, even though in both approaches we make queries to the database.
@pancho3322
@pancho3322 2 жыл бұрын
As I got from the video; Sessions are recommended for web applications, and tokens are better for mobile applications, right?
@NIKHILVERMA-xr7lc
@NIKHILVERMA-xr7lc 3 жыл бұрын
production content in 100 seconds!!
@ztest2975
@ztest2975 3 жыл бұрын
Please, create a video about OAuth authorization. Thanks in advance !
@Spreadlove5683
@Spreadlove5683 2 жыл бұрын
At 1:40, what does it mean that web tokens "can't be used to authenticate a user in the background on the server"?
@nicetomeetugaming7024
@nicetomeetugaming7024 2 жыл бұрын
Amazing video sir!
@smakosh
@smakosh 3 жыл бұрын
Cookies are not vulnerable to CSRF attack if you set the sameSite with a value of lax, mark it as http only and secure.
@02orochi
@02orochi 2 жыл бұрын
Wow finally i understand jwt
@teamgartz-motorsports6881
@teamgartz-motorsports6881 Жыл бұрын
Would be nice to include web authn to the comparisons. As it kinda mixes both.
@craft5875
@craft5875 3 жыл бұрын
Typescript in 100 seconds. Anyways, Your content is really useful.
@xiaotongyang6890
@xiaotongyang6890 3 жыл бұрын
is there a coupon for the websecurity academy?
@buka.a
@buka.a 3 жыл бұрын
which one is more safer to use??
@mohammadtanweerahmed3636
@mohammadtanweerahmed3636 3 жыл бұрын
I didn't het the part "it just have to verify the signature" so nothing stored on database. The token is sent with prefix Bearer what does token consists of ?
@fightforfitness2256
@fightforfitness2256 16 күн бұрын
Thank you sir
@Klayperson
@Klayperson Жыл бұрын
To help prevent stolen authorization tokens from being too dangerous, make them expire very quickly and implement a refresh token so that properly authenticated users can automatically receive fresh auth tokens before expiration so they don't have to keep relogging in.
@LilmeMusic
@LilmeMusic Жыл бұрын
No. If you make the token expire quickly, then the user has to log in way more frequently. A token is created when a user logs in with lets say a username and password. If that token is set to last for 30 mins, then during that 30 mins, if the user logs out, he doesn't have to enter his username and password to log in, he would enter the website automatically. But once 30 mins has passed and the user closes the website, the token will expire and he would have to put the username and password again to enter the website and create another token that would last another 30mins. The longer the token time, the less frequently the user has to log in with his username and password. And there is actually no need to fear hackers lmao(I can explain why if you want to know but JWT's are virtually impossible to hack). The only way is if the hacker steals the device of the user and the jwt has not expired yet, the hacker can just login freely, which just makes him a thief, lol. The responsibility of keeping the device safe falls on the user, not the web server(your server) but yeah you could make the jwt expiry time very short but I dont think its worth it
@niccpolitic6129
@niccpolitic6129 Жыл бұрын
@@LilmeMusic Ideally it would fall on the user but users are fucking stupid lmao
@buddh4r
@buddh4r Жыл бұрын
@@LilmeMusic That's why he mentioned the refresh token. If the auth token expires, the refresh token is used to get a new one. The refresh token will be valid for way longer than the auth token.
Жыл бұрын
@@buddh4r isnt that just passing the problem to refresh token? Someone can hijack refresh token and keep making auth tokens
@buddh4r
@buddh4r Жыл бұрын
@ The refresh token should only be sent when required so e.g. when using cookies, set a path in order to only include the cookie in the refresh request, you can also invalidate refresh tokens once they are used and create a new one (this may requires some server state). But yes generally if the refresh cookie is stolen its bad, but its the same (or less) risk as using session cookies which are not invalidated (at least not very often when using long sessions) and send with every request.
@cm3462
@cm3462 2 жыл бұрын
aamazing channel
@Hsa008
@Hsa008 3 жыл бұрын
Which software is used to make this animation?
@osamagamal495
@osamagamal495 3 жыл бұрын
On point!
@subham_1574
@subham_1574 3 жыл бұрын
That's a great video. Could you share the source of the awesome background music?
@JhoseinProductions
@JhoseinProductions 3 жыл бұрын
100s of OAuth would be a great follow up
@Yaxqb
@Yaxqb 2 жыл бұрын
A hot recommendation, don't use JWT if you don't have scaling issues. It just complicates things and you'll likely to reimplement things that sessions solve for you
@mikemartin6748
@mikemartin6748 Жыл бұрын
I don't think JWTs are that complicated. It's all handled with standardized libraries that make it quick and pain-free
@hk.32
@hk.32 Жыл бұрын
@Jack Lusher Sessions for the win!
@bossgd100
@bossgd100 Жыл бұрын
can you provide more details ?
@codinginflow
@codinginflow Жыл бұрын
​@@mikemartin6748What library handles the refresh process in a pain-free way? Except for full-blown backend services like Supabase. And then you still have the problem that you can't invalidate a token instantly when your account was hacked and you need to change your password.
@dandayne
@dandayne Жыл бұрын
Unless you develop your server in Assembly or have a compulsory need to reinvent the wheel by writing your own code for everything, this isn't true.
@ctfries1049
@ctfries1049 3 жыл бұрын
Can you do Yarn/NPM in 100 seconds?
@HeitorYT
@HeitorYT 3 жыл бұрын
So... How about use tokens and seasiona for login at the same time?
@abrahamghaemi8895
@abrahamghaemi8895 3 жыл бұрын
simple and fast :)
@FirdavsiWebDev
@FirdavsiWebDev 3 жыл бұрын
Do a recursive function in 100 seconds video. If you are wild enough!
@santokhan_
@santokhan_ 2 жыл бұрын
advanced level tutorial
@user-ib6wx4dh3l
@user-ib6wx4dh3l Жыл бұрын
so here is the question both session and token are stored on client side - then browser will send both of them as header, can someone explain how session is manipulated server side ? cause i don't get the last part of this video
@kamiyabasamadi4166
@kamiyabasamadi4166 3 жыл бұрын
what about refresh token and access token. can we solve the token based problem this way.
@daheck81
@daheck81 3 жыл бұрын
It’s not solving the problem in general but it makes it harder to exploit. So definitely a way to go. The safest approach using JWTs is to store/send them as httpOnly + SameSite cookies while using the accesss/refresh token approach.
@rumble1925
@rumble1925 3 жыл бұрын
@@daheck81 Hmm I'm sending the jwt as a response and save it to localstorage but use httpOnly + SameSite cookies for the refreshToken. Is that an ok approach?
@daheck81
@daheck81 3 жыл бұрын
@@rumble1925 Yes, that’s actually how I'm using it most of the time as well. As long as you keep the expiry time of your access token low (< 15 mins) this is safe enough.
@rumble1925
@rumble1925 3 жыл бұрын
@@daheck81 nice, thanks :)
@aungthura396
@aungthura396 Жыл бұрын
I have created custom email password login system in django. The problem is when I type url '/home', it reached homepage and not login page whenever I put '@login_required' decorater. Should I need that session or token.Or should I use auth0.
@SharkForG
@SharkForG Жыл бұрын
With an SPA JWT is a good solution but with its downsides. I am trying some workarounds to make it stateful ( I know, I know…) but easily manageable and light without refreshing the token all the time or hitting the database. So, when user’s logging in, I generate a private key with a passphrase ( the hashed user’s email + ID) and saving the key to a file. The filename of the key is a hash of the hashed user’s email + ID + user agent. In the database I just track the generated filename, user id, agent and timestamps. When a request is made this public information from the payload is combined so the private key file can be fetched. If the user agent is different or the key file is deleted, then the file can’t be found so the JWT can’t be validated. If everything is ok the public key is extracted from private key, validating the JWT. Thoughts?
@LilmeMusic
@LilmeMusic Жыл бұрын
JWT's dont hit the database, no need to waste your time. We store nothing on our servers and database, if we did there would be no point, we would just go back to sessions. JWT's are secure enough, dont worry
@bipinmaharjan4090
@bipinmaharjan4090 3 жыл бұрын
if ssl is not implement then jwt token is vulnerable right?
@klutch4198
@klutch4198 3 жыл бұрын
Jeff is in #BeastMode ! #BeastJeff
@kodiak9664
@kodiak9664 3 жыл бұрын
So do tokens typically use symmetric or asymmetric key pairs to validate the signatures? And either way, the server still has to generate unique key pairings for each token and then store the private key doesn't it? But that's still more efficient that storing sessions IDs?
@AdroSlice
@AdroSlice 2 жыл бұрын
I think the server only has one private key, but honestly I have no fucking clue.
@ben.pueschel
@ben.pueschel 2 жыл бұрын
The idea is that you have one key pair for all of your tokens that you might want to swap relatively frequently. Anyone could then validate the generated tokens but only the server could generate them. With purely stateless tokens the server would only need to check if the signature matches (but you might want to store revoked tokens in a database to handle revoking access) and then authenticate whatever user is specified in the token itself. The server doesn't need to keep track of all the sessions and only has to validate if the signature is valid or not. You should never use symmetric encryption in that use case.
@jamesfoo8999
@jamesfoo8999 2 жыл бұрын
Unfortunately if you want to use JWT with some level of control over invalidating tokens and logins, you have to store them in DB with an expiry and/or disabled column, and then you app needs to lookup the DB row to check the token is still valid/enabled.
@ggar493
@ggar493 Жыл бұрын
what about storing some info in the JWT claims section? Is it a good idea?
@jamesfoo8999
@jamesfoo8999 Жыл бұрын
​@@ggar493 You could, such as the hashed password and when a token is reported to be stolen etc change the users password and then hashed password in token wont match hashed password when you check it. However, whatever you put in the token you have to check on every request, the same as storing it in the DB with a "valid" column. The DB approach is simple and more likely for devs to understand. Also, the info in a token would have to be sensitive to the user somehow, then you're sending sensitive info around the net, encrypted or not it should be avoided, as this is a primary reason for tokens - authenticate with sensitive data once then use the token.
@LimitedWard
@LimitedWard 3 жыл бұрын
I still don't understand how tokens solve the storage issue. What aspect of the JWT uniquely identifies the user? Edit: I get it now. JWTs are cryptographically signed. So the server just decrypts and validates the token data
@benamato2880
@benamato2880 Жыл бұрын
you can also store whatever user data you want inside the JWT, which is handy and saves on traffic
@fbsouza
@fbsouza 3 жыл бұрын
It is possible deal with load balance with cookies? How to load a page with images where url of images are protected? How get images in protected api with jwt?
@JozsefPallagi
@JozsefPallagi Жыл бұрын
token can create anyone if its deployed, is it secure? What if someone create a token and manipulate the data on data server with that token ?
@nathanjbro
@nathanjbro 3 жыл бұрын
You forgot to say "... and see you in the next one" at the end
@gabimoncha
@gabimoncha 2 жыл бұрын
So what's the best way of authentification then?
@MiladCale
@MiladCale 3 жыл бұрын
We store both JWT and the refresh token in cookies. It seems to be the most balanced solution between security and scalability.
@Mankepanke
@Mankepanke 2 жыл бұрын
Sounds very bloated more like. You'd get the negative parts of both without the positive parts of either (not that JWT has any positive parts in the first place, though).
@uwirl4338
@uwirl4338 2 жыл бұрын
@@Mankepanke "Not that JWT has any positive parts in the first place" then why oh why are people using it enough for it to be one out of the two standards for web authentication? Why, Magnus Bergmark, why? People will really fanboy over the tiniest things.
@samplebriefmint4204
@samplebriefmint4204 2 жыл бұрын
@@uwirl4338 Mostly because of it's simplicity. I'd concur that security wise, well implemented sessions are most likely more secure than well implemented JWT, but JWTs are easier to quickly add to any codebase, especially with the popularity of "serverless" nowadays, I think
@theraven.4
@theraven.4 2 жыл бұрын
@@uwirl4338 .... When you are in a argument never ever attempt to bring up that just because people uses a technology means that is good... Also, the amount of people using it doesn't relate to why it is a standard...
@yehor_ivanov
@yehor_ivanov Жыл бұрын
@@theraven.4 has anyone asked for a life advise here though?.. don't think so )
@cinnakarimi1749
@cinnakarimi1749 Жыл бұрын
Hey, thanks for your perfect videos. I wanted to join the wait list of web security academy but the link is broken. It redirects me to a 404 page.
@kinjalbasu9220
@kinjalbasu9220 3 жыл бұрын
I am making a private app using firebase. I do not want users to register themselves as I will provide them custom username and passwords. I am struggling to implement this logic in firebase auth. Would extremely appreciate any regarding this topic.
@ahmedraed8645
@ahmedraed8645 2 жыл бұрын
awesome as always but the music is too loud
@erickgeneric
@erickgeneric 3 жыл бұрын
Okay. So what do I use instead to persist user data :(
TypeScript in 100 Seconds
2:25
Fireship
Рет қаралды 834 М.
What Is JWT and Why Should You Use JWT
14:53
Web Dev Simplified
Рет қаралды 1,1 МЛН
I Can't Believe We Did This...
00:38
Stokes Twins
Рет қаралды 73 МЛН
ИРИНА КАЙРАТОВНА - АЙДАХАР (БЕКА) [MV]
02:51
ГОСТ ENTERTAINMENT
Рет қаралды 11 МЛН
100+ Linux Things you Need to Know
12:23
Fireship
Рет қаралды 377 М.
Reacting to Controversial Opinions of Software Engineers
9:18
Fireship
Рет қаралды 2 МЛН
I tried 10 code editors
10:28
Fireship
Рет қаралды 2,9 МЛН
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 594 М.
How to OVER Engineer a Website // What is a Tech Stack?
11:20
Fireship
Рет қаралды 2,3 МЛН
The 3 Laws of Writing Readable Code
5:28
Kantan Coding
Рет қаралды 338 М.
Why is JWT popular?
5:14
ByteByteGo
Рет қаралды 287 М.
The Magic of RISC-V Vector Processing
16:56
LaurieWired
Рет қаралды 232 М.
Main filter..
0:15
CikoYt
Рет қаралды 15 МЛН
Худший продукт Apple
0:53
Rozetked
Рет қаралды 226 М.
Hisense Official Flagship Store Hisense is the champion What is going on?
0:11
Special Effects Funny 44
Рет қаралды 2,7 МЛН
Simple maintenance. #leddisplay #ledscreen #ledwall #ledmodule #ledinstallation
0:19
LED Screen Factory-EagerLED
Рет қаралды 23 МЛН
Tag her 🤭💞 #miniphone #smartphone #iphone #samsung #fyp
0:11
Pockify™
Рет қаралды 17 МЛН
Что не так с яблоком Apple? #apple #macbook
0:38
Не шарю!
Рет қаралды 485 М.