Security
Security
OAuth 2.0 & OIDC
Authorization code flow, PKCE for public clients, access/refresh token lifecycle, OIDC identity layer, and token revocation strategies
JWT (JSON Web Tokens)Header.payload.signature structure, HS256 vs RS256 key models, stateless validation, JWKS key distribution, and alg:none / key-confusion attacks
API Authentication PatternsAPI keys (hashed storage), HMAC request signing (replay prevention), mTLS for microservices, JWT Bearer tokens, and scheme selection by caller trust level