Avatar 🔐

Brennenstuhl on Security

Exploring usable security & website authentication with a foible for data breaches, account security and pass{keys, codes, words}.

  1. Home
  2. About me
  3. Knowledge Base
  4. Search
  5. Archives
  6. Disclaimer
    1. Dark Mode

Categories

Identity & Access Management Software Engineering Application Security Ethical Hacking Software Security

Tags

JWT OSS Password Security OIDC OAuth 2.0 SRE Usable Security AWS Defensive Security EuroStack
Featured image of post On Making Spring Security OAuth RFC-compliant
Application Security

On Making Spring Security OAuth RFC-compliant

On Fixing Spring Security OAuth: I fixed a small HTTP header extractor for the Spring Security OAuth open source project recently. Here's what happened & what I learned...

01. Feb 2017
4 minute read
Featured image of post Weak Crypto, Github SAML Attack & Twitter Security UX
Application Security

Weak Crypto, Github SAML Attack & Twitter Security UX

Want to use JWT for password-reset or email activation? Turn app state into HMAC-keys to guarantee one-time use of JWTs! This is how it works …

15. Jan 2017
3 minute read
Featured image of post Single-Use JWT: Unlocking the Power of Stateless One Time Token
Identity & Access Management

Single-Use JWT: Unlocking the Power of Stateless One Time Token

I delve into the transformative potential of JWTs as one-time tokens, exploring their advantages, implementation considerations, and real-world use cases.

30. Dec 2016
7 minute read
Featured image of post AWS DynamoDB: Backup & Recovery Strategy
Software Security

AWS DynamoDB: Backup & Recovery Strategy

In this article, I outline a DynamoDB backup and recovery strategy based on Datapipelines, S3 & AWS Lambdas.

18. Jan 2016
3 minute read
Featured image of post Abusing JSON: Why AWS CloudFormation sucks?!
Software Engineering

Abusing JSON: Why AWS CloudFormation sucks?!

Infrastructure as code is great but AWS Cloudformation is not! Learn why JSON-based Cloudformation is bad and what alternatives exist …

21. May 2015
3 minute read
1 … 4 5 6
Brennenstuhl on Security
Made and hosted in the EU 🇪🇺 · Powered by Hugo & Stack
Imprint · Privacy