A security analysis of authentication and authorization implemented in web applications based on the REST architecture

Main Article Content

DOI

Tomasz Muszyński

tomasz.muszynski@pollub.edu.pl

Grzegorz Koziel

g.koziel@pollub.pl

Abstract

The purpose of this article is to prepare a security analysis of authentication and authorization mechanisms in web applications based on the REST architecture. The article analyzes the problems encountered during the implementation of the JSON Web Token (JWT) mechanism. The article presents examples of problems related to the implementation of authorization and authentication, and presents good practices that help ensure application security.

Keywords:

REST, JWT, API, security, security vulnerability

References

Article Details

Muszyński, T., & Koziel, G. (2020). A security analysis of authentication and authorization implemented in web applications based on the REST architecture. Journal of Computer Sciences Institute, 16, 252–260. https://doi.org/10.35784/jcsi.1925