digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

823
active users

#jwt

1 post1 participant0 posts today
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p><span class="h-card" translate="no"><a href="https://chaos.social/@calisti" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>calisti</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@biscuitauth" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>biscuitauth</span></a></span> I had been searching for PASETO beloved JWT Alternatieve, but now this has come to me, hence my question here (ノдヽ)</p><p><a href="https://chaos.social/tags/paseto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>paseto</span></a> <a href="https://chaos.social/tags/jwt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jwt</span></a> <a href="https://chaos.social/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://chaos.social/tags/webauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webauth</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>Biscuit – Eclipse Biscuit is an authorization token with decentralized verification, offline attenuation and strong security policy enforcement based on a logic language</p><p>Has anyone of you ever used <span class="h-card" translate="no"><a href="https://hachyderm.io/@biscuitauth" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>biscuitauth</span></a></span> and implemented it in a web project? Can you omit this or should I stick to standards or use other alternatives?</p><p>🍪 <a href="https://www.biscuitsec.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">biscuitsec.org</span><span class="invisible"></span></a></p><p><a href="https://chaos.social/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://chaos.social/tags/authorisation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authorisation</span></a> <a href="https://chaos.social/tags/decentralization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decentralization</span></a> <a href="https://chaos.social/tags/biscuit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biscuit</span></a> <a href="https://chaos.social/tags/biscuitsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biscuitsec</span></a> <a href="https://chaos.social/tags/itsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsec</span></a> <a href="https://chaos.social/tags/websec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>websec</span></a> <a href="https://chaos.social/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://chaos.social/tags/decentralized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decentralized</span></a> <a href="https://chaos.social/tags/webapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapp</span></a> <a href="https://chaos.social/tags/webapi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapi</span></a> <a href="https://chaos.social/tags/dev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dev</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://chaos.social/tags/oauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth</span></a> <a href="https://chaos.social/tags/jwt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jwt</span></a></p>
Dagger ☀️<p>Das James-Webb-Teleskop <a href="https://chaos.social/tags/JWT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JWT</span></a> hat den 29. Mond des <a href="https://chaos.social/tags/Uranus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uranus</span></a> entdeckt <a href="https://www.telepolis.de/features/James-Webb-Teleskop-entdeckt-29-Mond-des-Uranus-10558394.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">telepolis.de/features/James-We</span><span class="invisible">bb-Teleskop-entdeckt-29-Mond-des-Uranus-10558394.html</span></a>.</p><p>Oder ist es eine Raumstation?<br>Na dann gute Nacht Internet.</p>
Alexander Goeres 𒀯also wirklich! das JWT ist dafür gedacht, wolkenformationen auf exoplanten in der magellan'schen wolke zu filmen und dunkle materie in 20 mrd lichtjahren entfernung zu enttarnen. und die nasa spielt mondesuchen am uranus damit ... <br><br>:-)<br><br>#<a class="" href="https://hub.netzgemeinde.eu/search?tag=wissenschaft" rel="nofollow noopener" target="_blank">wissenschaft</a> #<a class="" href="https://hub.netzgemeinde.eu/search?tag=JamesWebbTeleskop" rel="nofollow noopener" target="_blank">JamesWebbTeleskop</a> #<a class="" href="https://hub.netzgemeinde.eu/search?tag=jwt" rel="nofollow noopener" target="_blank">jwt</a> #<a class="" href="https://hub.netzgemeinde.eu/search?tag=astronomie" rel="nofollow noopener" target="_blank">astronomie</a> <br><br> <a href="https://social.heise.de/@heiseonline" rel="nofollow noopener" target="_blank"></a><span><a href="https://social.heise.de/@heiseonline" rel="nofollow noopener" target="_blank">heise online</a> wrote the following <a href="https://social.heise.de/@heiseonline/115060443739165226" rel="nofollow noopener" target="_blank">post</a> <span class="">Wed, 20 Aug 2025 11:44:00 +0200</span></span> Mit dem Weltraumteleskop James Webb: Weiterer kleiner Mond des Uranus entdeckt<br><br>Mehr Monde als der Uranus haben im Sonnensystem nur der Jupiter und der Saturn. Nun ist ein weiterer dazugekommen, die Gesamtzahl steigt damit auf jetzt 29.<br><br><a href="https://www.heise.de/news/Mit-dem-Weltraumteleskop-James-Webb-Weiterer-kleiner-Mond-des-Uranus-entdeckt-10551203.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" target="_blank">https://www.heise.de/news/Mit-dem-Weltraumteleskop-James-Webb-Weiterer-kleiner-Mond-des-Uranus-entdeckt-10551203.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</a><br><br><a href="https://social.heise.de/tags/Astronomie" rel="nofollow noopener" target="_blank">#Astronomie</a> <a href="https://social.heise.de/tags/Wissenschaft" rel="nofollow noopener" target="_blank">#Wissenschaft</a> <a href="https://social.heise.de/tags/news" rel="nofollow noopener" target="_blank">#news</a>
Markus Eisele<p>Beyond @RolesAllowed: Fine-Grained RBAC in Quarkus. Secure every document with per-object permissions, JWT identity, and a lean 100-line service. <br><a href="https://www.the-main-thread.com/p/quarkus-fine-grained-rbac-tutorial" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">the-main-thread.com/p/quarkus-</span><span class="invisible">fine-grained-rbac-tutorial</span></a><br><a href="https://mastodon.online/tags/Java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Java</span></a> <a href="https://mastodon.online/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.online/tags/Quarkus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quarkus</span></a> <a href="https://mastodon.online/tags/RBAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RBAC</span></a> <a href="https://mastodon.online/tags/JWT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JWT</span></a></p>
damienbod<p>Blogged: Use EdDSA signatures to validate tokens in ASP.NET Core using OpenID Connect</p><p><a href="https://damienbod.com/2025/08/06/use-eddsa-signatures-to-validate-tokens-in-asp-net-core-using-openid-connect/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/08/06/use-e</span><span class="invisible">ddsa-signatures-to-validate-tokens-in-asp-net-core-using-openid-connect/</span></a></p><p><a href="https://mastodon.social/tags/openid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openid</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openidconnect</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identity</span></a> <a href="https://mastodon.social/tags/eddsa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eddsa</span></a> <a href="https://mastodon.social/tags/jwt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jwt</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth</span></a></p>
JCON<p>Our next <a href="https://mastodon.social/tags/JCON2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JCON2025</span></a> session is live: 'From Zero to Secured: Live-Coding a <a href="https://mastodon.social/tags/Jakarta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jakarta</span></a> EE REST App with <a href="https://mastodon.social/tags/MicroProfile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicroProfile</span></a> and <a href="https://mastodon.social/tags/JWT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JWT</span></a> Authentication' with <span class="h-card" translate="no"><a href="https://foojay.social/@hannotify" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hannotify</span></a></span> </p><p>Join me for a comprehensive session designed to take you through <a href="https://mastodon.social/tags/building" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>building</span></a> a …</p><p>Grab your coffee and hit play: <a href="https://youtu.be/m8SWcuNKyVQ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/m8SWcuNKyVQ</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Java</span></a></p>
Kushal Das :python: :tor: 🇸🇪<p>In <a href="https://toots.dgplug.org/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> / <a href="https://toots.dgplug.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> I have a <a href="https://toots.dgplug.org/tags/HTTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HTTP</span></a> endpoint (<a href="https://toots.dgplug.org/tags/actix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>actix</span></a>) , where for a given query, it fetches <a href="https://toots.dgplug.org/tags/JWT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JWT</span></a> from the given parameter (URLS) and validates, puts some logic and returns the result. How to write unittest for this care in rust?</p>

Today, it's exactly one month since I released #swad 0.11. And I'm slowly closing in on releasing 0.12.

The change to a "multi #reactor" design was massive. It pays off though. On the hardware that could reach a throughput of roughly 1000 requests per second, I can now support over 3000 r/s, and when disabling #TLS, 10 times as much. Most of the time, I spent with "detective work" to find the causes for a variety of crashes, and now I'm quite confident I found them all, at least on #FreeBSD with default options. As 0.11 still has a bug affecting for example the #epoll backend on #Linux, expect to see swad 0.12 released very very soon.

I'm still not perfectly happy with RAM consumption (although that could also be improved by explicitly NOT releasing some objects and reusing them instead), and there are other things that could be improved in the future, e.g. experiment with how to distribute incoming connections to the worker threads, so there's not one "loser" that always gets slowed down massively by all the others. Or design and implement alternative #JWT #signature algorithms besides #HS256 which could enable horizontal scaling via load balancing. Etc. But I think the improvements for now are enough for a release. 😉

Ah, yes, the riveting tale of JWT's "epic" decade-long #journey through the digital wilderness, where it single-handedly transformed the world of JSON-based tokens... or at least, that's what Mike wants us to believe. 🎉🔐 So, buckle up for another thrilling decade of self-congratulatory musings and cryptographic jargon. 🥳📜
self-issued.info/?p=2708 #JWT #DigitalTokens #CryptoCulture #JSONAdventure #HackerNews #ngated

self-issued.infoTen Years of JSON Web Token (JWT) and Preparing for the Future – Mike Jones: self-issued

Several years ago, I was working on our local #OIDC identity provider at work ... part of which was looking at a #JWT (JSON Web Token) quite frequently.

Now I implemented JWT myself (from the ground up in pure #C) for #swad to make it independent of sessions.

Well, dejavu here ... even back then, I always chuckled a bit how every JWT basically says "ey ... EY!" to me 🤪 🤡 (see it? *scnr*)

Continued thread

More progress, I decoupled the challenge for the #Anubis-like proof-of-work checker from the #session. Again doing something slightly similar to what Anubis does: Instead of a completely random challenge, create it by hashing some data making it reproducible:

* an expiry timestamp
* the remote address (the real one obtained from proxy headers)
* the user-agent
* Accept, Accept-Language and Accept-Encoding

The challenge now expires after 2 minutes. The client has to post back the expiry timestamp so the exact same challenge can be reproduced for validation.

Still some work to do for making #swad "session-less". Next step, decouple the rate-limiter for failed logins, then finally move to storing all auth info in a signed #JWT.

Continued thread

Doing some first experiments, here's how a #JWT for #swad might look like, containing a custom property that has the "auth info" that's currently stored in the server-side #session ... 🤔

Now add a JOSE header, base64-encode and sign that beast...