Avatar ๐Ÿ”

Brennenstuhl on Security

Exploring usable security & website authentication with a foible for data breaches, account security and pass{keys, codes, words}.

  1. Home
  2. About me
  3. Knowledge Base
  4. Search
  5. Archives
  6. Disclaimer
    1. Dark Mode

Categories

Identity & Access Management Software Engineering Ethical Hacking Software Security Application Security

Tags

JWT OSS Password Security OIDC OAuth 2.0 UX Security AWS Defensive Security Git Offensive Security
Featured image of post Bunny CDN: How to redirect Root Domain to Subdomain
Software Engineering

Bunny CDN: How to redirect Root Domain to Subdomain

Bunny.net: Learn how to redirect a root domain to its www subdomain using Bunny DNS and Bunny CDN Edge Rules.

22. Apr 2025
3 minute read
Featured image of post What is JWA? A Deep Dive into JSON Web Algorithms
Identity & Access Management

What is JWA? A Deep Dive into JSON Web Algorithms

JSON Web Algorithms (JWA) power all JWT use cases. Learn how to decode JWA short names, what algorithms there are and why JWA matters for OpenID Connect.

08. Jun 2023
3 minute read
Featured image of post Mastering JWKS: JSON Web Key Sets Explained
Identity & Access Management

Mastering JWKS: JSON Web Key Sets Explained

Demystify JWKS with this simplified guide. Learn about JSON Web Key Sets, their purpose, and how to implement them successfully. Master JWKS now!

02. Jun 2023
6 minute read
Featured image of post JWE Token: An In-depth Exploration into JSON Web Encryption Standards
Identity & Access Management

JWE Token: An In-depth Exploration into JSON Web Encryption Standards

Explore the world of JWE token with this in-depth guide. Gain a comprehensive understanding of JSON Web Encryption standards.

29. May 2023
12 minute read
Featured image of post JWT vs OAuth 2.0: Understanding the Key Differences
Identity & Access Management

JWT vs OAuth 2.0: Understanding the Key Differences

Learn the key differences between JWT and OAuth 2.0 from our expert guide on JWT vs OAuth. Understand which one to choose for authentication.

24. May 2023
7 minute read
1 2 … 6
Brennenstuhl on Security
Made in ๐Ÿ‡ฉ๐Ÿ‡ช ยท Hosted in ๐Ÿ‡ช๐Ÿ‡บ ยท Powered by Hugo & Stack
Imprint ยท Privacy