Webinars

How to Best Leverage JWTs for API Security

Presented by:

Isabelle Mauny 
Field CTO and Co-founder

JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT standards are quite complex and it’s very easy to get the implementation wrong. As a result, data breaches and API vulnerabilities due to poor JWT implementation, token leakage, and lack of proper validation remain widespread. 

This webinar focuses on JWT best practices, most common JWT attacks and how the 42Crunch API Security Platform leverages OpenAPI (Swagger) Specification extensions to prevent them.

In this webinar you will learn:

  • How to best use JWTs for API Security
  • Most common attacks as illustrated in RFC 8725
  • How 42Crunch can help you protect your APIs from those attacks

Webinar Follow-up

Hope you enjoyed the webinar! Below you can download the slide deck, visit our blog 
for full Q&A and learn more about 42Crunch! 

How to Best Leverage JWTs for API Security Slide Deck

Download

How to Best Leverage JWTs for API Security Q&A Blog

Read the Blog

42Crunch API Security 
Platform Data Sheet

Download
Free Tools: Check out our free API Security Tools that you can add to your IDE and CI/CD!
Free Tools

Resources

Want to learn more? Here are some resources to help you out.

Free Tools

Looking to make OpenAPI / Swagger editing easier? Or want to see how secure your API is? Check out our free tools.

Get the Tools!

API Security Top 10

Learn more about the OWASP API Security Top 10, how 42Crunch can help, and download our cheat sheet!

Learn More

Better Together

Already have API Management? Great! The 42Crunch API Security Platform is the perfect compliment. Get the data sheet.

Download

Ready to Get Started?

Developer-first solution for delivering API security as code.