How (not) to sign a JSON object
Last year we did a blog post on interservice auth. This post is mostly about
authenticating consumers to an API. That’s a related but subtly different
problem: you can probably impose more requirements on your internal users than
your customers. The idea is the same though: you’re trying to differentiate
between a legitimate user and an attacker, usually by getting the legitimate
user to prove that they know a credential that the attacker doesn’t.You don’t really want a signatureWhen cryptograph...
Read more at latacora.com