{"id":9824,"date":"2020-12-11T19:42:36","date_gmt":"2020-12-11T19:42:36","guid":{"rendered":"https:\/\/staging-site.42crunch.com\/?p=9824"},"modified":"2022-11-23T10:33:10","modified_gmt":"2022-11-23T10:33:10","slug":"webinar-questions-jwt-api-security","status":"publish","type":"post","link":"https:\/\/staging2022.42crunch.com\/webinar-questions-jwt-api-security\/","title":{"rendered":"Questions Answered: How to Best Leverage JWTs or API Security"},"content":{"rendered":"
\n

You had questions, and we’ve got answers!<\/strong><\/h2>\n
Thank you for all the questions submitted on our webinar: “How to Best Leverage JWTs or API Security<\/strong><\/a>” We were unable to get to your questions, so below are all the answers to the questions that were asked! If you’d like more information please feel free to contact us<\/a>.<\/div>\n<\/div>\n

 <\/p>\n

On slide 26 is the\u00a0 HS256 or RSA key used by the attacker to sign the token?<\/strong><\/h5>\n

 <\/p>\n

\"\"<\/p>\n

 <\/p>\n

This attack happens when you are using an asymmetric algorithm (RSA) and the attacker replaces it with a symmetric one (HMAC like HS256 in our example.)<\/span><\/p>\n

In regular use (expected by the API implementation):<\/span><\/p>\n