Cross-Site Request Forgery Vulnerabilities OWASP Cross-Site Request Forgery(CSRF) is one of the top 10 security vulnerabilities with high risk. It allows a hacker to perform an action on the vulnerable site on behalf of the victim(user). If the site does not validate the original request properly then the attack is possible. Attacker forges the […]
Tag: token
How to decode Id Token in java
How to decode Id Token in java Id Token generated by the authorization server which contains the user information and authorization server details. Here I am sharing the java example program to decode the Id Token. Pre-Requisites java 1.8 Eclipse Create java maven project in eclipse the add the following pom.xml and java file into […]