Security
Table of Contents
Authentication Types
1. Session-Based Auth (Stateful)
2. Token-Based Auth (Stateless - JWT)
3. Mutual TLS (mTLS)
Authorization Models
1. RBAC (Role-Based Access Control)
2. ABAC (Attribute-Based Access Control)
3. ACL (Access Control Lists)
OAuth 2.0 & OIDC
Concepts
Common Flows
1. Authorization Code Flow (Standard)
2. Authorization Code with PKCE (Mobile/SPA)
3. Client Credentials Flow
OIDC (OpenID Connect)
Transport Security
HTTPS / TLS 1.3
Common Vulnerabilities
1. SQL Injection
2. XSS (Cross-Site Scripting)
3. CSRF (Cross-Site Request Forgery)
4. DDoS (Distributed Denial of Service)
Security Patterns
Zero Trust Architecture
Secrets Management
Last updated