APIs performance: Meaning of percentile
Let's say there are 100 values of response times and we arrange the values in ascending order. In order to compute the 90th percentile, the
DSA | Binary Search | Solution for Mistake which took around 9 years to surface
In the last article https://www.techlearnings.org/single-post/dsa-binary-search-mistake-which-took-around-9-years-to-surface, we talked...
DSA | Binary Search | Mistake which took around 9 years to surface
Binary Search is a search algorithm to find an element in a sorted array. It works on the principle of Divide and Conquer means we continue
OAuth 2.0 | Practical Demonstration | Spring Boot & GitHub
Wow! With the 10th article, we're now ready for the practical demonstration.
OAuth 2.0 | JSON Web Token (JWT) | What if JWT is stolen?
What if someone stoles my token? The application or malicious user can impersonate me and can do everything authorized with that token? How
OAuth 2.0 | JSON Web Token (JWT) | How to validate?
The RFC framework specifies following steps to validate a JWT. If any of the step fails, then token is simply invalid.
OAuth 2.0 | JSON Web Token (JWT) | Structure
With 7th article on OAuth, time to see today how a JWT looks like? What are the different parts of which it is made up of? We already...
OAuth 2.0 | JSON Web Token (JWT) | Claims
JWTs are an open, industry standard RFC 7519 method for representing claims securely between two parties. A claim is a piece of information.
OAuth 2.0 | Client Authentication
We know the authorisation server must recognise the client in order to grant access token to it. How will it recognise?
OAuth 2.0 | Client ID and Secret
In continuation on our OAuth journey, let's talk about today, two very important concepts - clientId and secret.