The Basic and Digest authentication schemes are dedicated to the authentication using a username and a secret (see RFC7616 and RFC7617).
The Bearer authentication scheme is dedicated to the authentication using a token and is described by the RFC6750.
defines a compact and self-contained way for securely transmitting information between parties as a JSON object.
- Never store unencrypted secrets in .git repositories
- Don’t share your secrets unencrypted in messaging systems like slack
- Restrict API access and permissions
-
encryption :Encryption is the process of taking plain text, like a text message or email, and scrambling it into an unreadable format
-
token: In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept
-
bearer : Bearer authentication (also called token authentication) is an HTTP authentication scheme that involves security tokens called bearer tokens
-
secret : Secret key is used for Private key cryptography. A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code
-
JSON Web Token : which defines a compact and self-contained method to encapsulate and share assertions (claims) about an entity (subject) between peers in a secure manner by using JSON objects
- secret key and how to use it
- the idea of bearer
- web access token
- jwt types
- how to hack wen access token
- encrypting data methods
- the pattern thumb key access
user -> role -> rights
is nothing more than the idea of assigning system access to users based on their role within an organization. The system needs of a given workforce are analyzed, with users grouped into roles based on common job responsibilities and system access needs. Access is then assigned to each person based strictly on their role assignment. With tight adherence to access requirements established for each role, access management becomes much easier.
-
Access control lists (ACL) — An ACL is a means of defining access rights by a given user or user group
-
Attribute-based access control (ABAC) — ABAC, sometimes known as policy-based access control
- Inventory your systems
- Analyze your workforce and create roles
- Assign people to roles
- Never make one-off changes
- Audit

