Verification of certificate trustworthiness (e.g. in JWS and Client Certificate)

I am comparing implementation complexity of JWS and Client Certificate and troubleshooting Client Certificate at the same time.
I understand that both methods require to prove that the certificate (x5c in JWS or the actual Client Certifica… Continue reading Verification of certificate trustworthiness (e.g. in JWS and Client Certificate)

Is it bad practice to use only one token for a SPA (no applications, only user)?

Say we have multiple instances of application X deployed on site1.com, site2.com, site3.com, etc. And we have a centralized server at example.com serving all of these.
All the instances of X are static sites, that is, they do not have a se… Continue reading Is it bad practice to use only one token for a SPA (no applications, only user)?

Use-case for decentralized identifiers (DIDs) with unique identities for each relationship

The W3C working group is working on the standardization of Decentralized Identifiers (DIDs). I watched a video presentation about DIDs and the presenter mentioned several times the possibility of generating unique pseudonymous identities f… Continue reading Use-case for decentralized identifiers (DIDs) with unique identities for each relationship

How can OAuth2 (tokens) fit into dynamic sites that still wants to call protected API’s via JavaScript?

(I try to understand different concepts regarding web development in general)
Most information I find is about Single Page Applications, but how does a dynamic site make use of (for example) OAuth2/tokens? Maybe we want the pages to be ren… Continue reading How can OAuth2 (tokens) fit into dynamic sites that still wants to call protected API’s via JavaScript?