Skip to content

Latest commit

 

History

History
41 lines (20 loc) · 1.75 KB

File metadata and controls

41 lines (20 loc) · 1.75 KB

Authorization/Authentication

IP Authentication Header is used to provide connection-less integrity and data origin authentication. There are two main advantages that Authentication Header provides,

Source Authentication –

It means, source is exactly source from whom we were expecting data.

Message Integrity –

It means, message is not modified while coming from source.

When packet is sent from source A to Destination B, it consists of data that we need to send and header which consist of information regarding packet. Authentication Header verifies origin of data and also payload to confirm if there has been modification done in between, during transmission between source and destination.

Authentication Header : The question may arise, that how IP header will know that adjacent Extension header is Authentication Header. Well, there is protocol field in IP Header which tells type of header that is present in packet. So, protocol field in IP Header should have value of “51” in order to detect Authentication Header.

Header

What is safe to put into a JWT

put very strong secret-Key

put encoding password

How are JWTs validated

The Signature is created using the Header and Payload segments,

RBAC

sort of it you know what you do your function perghaps that may govern what kind of files you can access if your human resources or payroll or you are in a different department the set of files you can would depend on what your role in the orgainzation

User Roles

are permission sets that control access to areas and features within the Professional Archive Platform

https://medium.com/dataseries/public-claims-and-how-to-validate-a-jwt-1d6c81823826