Professional Documents
Culture Documents
ALEXANDRU TRIFU
IT&C Security Master
Department of Economic Informatics and Cybernetics
The Bucharest University of Economic Studies
Calea Dorobanti, no. 15-17, Sector 1,
Bucharest, 010552
ROMANIA
alexandru.trifu7@gmail.com
Abstract: In recent years, the development of web based applications increased significantly.
Because of this high demand for developing web applications, a lot of security leaks appeared,
mostly of these targeting the mechanism for access management. In this world of Internet, there are
many ways to secure the authentication process and one of the most popular standard used is called
Json Web Token (JWT). These methods for authentication and authorization prevent unauthorized
users from accessing data from a specific application. Since everybody wants to have a secured
process for authentication and authorization of users within an application, in this paper, we are
aiming to evaluate the integration of JWT with a web based application. This study shows the way of
granting permissions authorities between two parties since Json Web Token can provide default and
custom claims for this approach. By using this method, we concluded that the confidence level is
significantly increased when we are talking about authentication security and manageability. We will
discover how it is to have a powerful authentication mechanism using JWT and in addition we’ll see
what are the advantages and disadvantages of this standard.
References
[1] L. V. Jánoky, J. Levendovszky and P.
Ekler1,"An analysis on the revoking
mechanisms for JSON Web
Tokens," International Journal of
Distributed
Sensor Networks, vol. 14(9), pp. 2-4, 2018.
[2] P. Mestre, P. M.-P. Rui Madureira and
C.Serodio, "Securing RESTful Web
Services