Further reading
These links provide further reading on handling JWTs:
- https://42crunch.com/7-ways-to-avoid-jwt-pitfalls/
- https://auth0.com/blog/a-look-at-the-latest-draft-for-jwt-bcp/
- https://curity.io/resources/learn/jwt-best-practices/
- https://redis.com/blog/json-web-tokens-jwt-are-dangerous-for-user-sessions/
These links provide further reading on implementing OAuth2:
- https://pragmaticwebsecurity.com/files/cheatsheets/oauth2securityfordevelopers.pdf
- https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics
- https://auth0.com/resources/ebooks/oauth-openid-connect-professional-guide/
- https://www.moesif.com/blog/technical/cors/Authoritative-Guide-to-CORS-Cross-Origin-Resource-Sharing-for-REST-APIs/
- https://curity.io/resources/learn/spa-best-practices/
- https://datatracker.ietf.org/doc/html/rfc6819
These links provide further reading on using authorization middleware: