Journal of Computer Sciences Institute (Sep 2020)

A security analysis of authentication and authorization implemented in web applications based on the REST architecture

  • Tomasz Muszyński,
  • Grzegorz Koziel

DOI
https://doi.org/10.35784/jcsi.1925
Journal volume & issue
Vol. 16
pp. 252 – 260

Abstract

Read online

The purpose of this article is to prepare a security analysis of authentication and authorization mechanisms in web applications based on the REST architecture. The article analyzes the problems encountered during the implementation of the JSON Web Token (JWT) mechanism. The article presents examples of problems related to the implementation of authorization and authentication, and presents good practices that help ensure application security.

Keywords