paseto | Java Implementation of Platform-Agnostic Security Tokens | Authentication library

 by   atholbro Java Version: Current License: MIT

kandi X-RAY | paseto Summary

kandi X-RAY | paseto Summary

paseto is a Java library typically used in Financial Services, Banks, Payments, Security, Authentication applications. paseto has no bugs, it has no vulnerabilities, it has build file available, it has a Permissive License and it has high support. You can download it from GitHub, Maven.

Paseto (Platform-Agnostic SEcurity TOkens) is a specification and reference implementation for secure stateless tokens.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              paseto has a highly active ecosystem.
              It has 33 star(s) with 7 fork(s). There are 6 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 1 open issues and 6 have been closed. On average issues are closed in 189 days. There are no pull requests.
              It has a positive sentiment in the developer community.
              The latest version of paseto is current.

            kandi-Quality Quality

              paseto has 0 bugs and 0 code smells.

            kandi-Security Security

              paseto has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              paseto code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              paseto is licensed under the MIT License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              paseto releases are not available. You will need to build from source code and install.
              Deployable package is available in Maven.
              Build file is available. You can build the component from source.
              Installation instructions, examples and code snippets are available.
              It has 8139 lines of code, 988 functions and 115 files.
              It has medium code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed paseto and discovered the below as its top functions. This is intended to give you an instant insight into paseto implemented functionality, and help decide if they suit your requirements.
            • Validates an Aeaded XCHa20 .
            • Sign the payload .
            • Generate a RSA key pair .
            • Uses a cha - cha205 encryption .
            • Validates the token .
            • Calculate pae .
            • Validates HKDF extract .
            • Splits the given token .
            • Signs a signature .
            • Decodes a string .
            Get all kandi verified functions for this library.

            paseto Key Features

            No Key Features are available at this moment for paseto.

            paseto Examples and Code Snippets

            No Code Snippets are available at this moment for paseto.

            Community Discussions

            QUESTION

            Use libsodium in NAPI
            Asked 2019-Sep-02 at 10:01

            I am using a library which depends on libsodium (libpaseto). I have installed it on my machine and I am trying to build a nodejs addon.

            I have the following binding.gyp file:

            ...

            ANSWER

            Answered 2019-Sep-02 at 10:01

            So I finally found the answer.In the libsodium documentation it mentions that you have to pass the -lsodium flag to be able to compile without problems.So what I had to do was to add this flag in my libraries in binding.gyp. So here is my final binding.gyp file:

            Source https://stackoverflow.com/questions/57740825

            QUESTION

            Can "token" generated using "Paseto Token" be decrypted and viewed like "JWT Token"?
            Asked 2019-Jul-16 at 02:43

            I am using "Platform agnostic Security Token" for oAuth in Golang - https://github.com/o1egl/paseto

            I am not able to understand, why this is better than JWT even after reading README

            My Major Question is:

            1. Can "token" generated be altered like "JWT" and pass modified or tampered data?
            2. Can "token" generated using "paseto" be decrypted and viewed like "JWT"?

            Paseto library above uses "SET" and "GET" method inside their JSONToken method. Is that how we can verify authenticity of the user?

            Sample Code:

            ...

            ANSWER

            Answered 2019-Jul-16 at 02:43

            1 - Can "token" generated be altered like "JWT" and pass modified or tampered data?

            Note that token cannot be "altered" either using PASETO or JWT without knowing the signing key (which should of course be secret).

            The fact you mention about being able to view the JWT token data in JWT.io page is because data is not encrypted (so you can see it without the key).

            But token is signed, so if you modify any value and don't have the key, you won't be able to sign it back and the token receiver will note the token is not valid when trying to verify it.

            2 - Can "token" generated using "paseto" be decrypted and viewed like "JWT"?

            It depends on how you generate the PASETO token.

            See here:

            https://tools.ietf.org/id/draft-paragon-paseto-rfc-00.html#rfc.section.2

            Format for the token is version.purpose.payload.

            And from the docs:

            The payload is a string that contains the token's data. In a local token, this data is encrypted with a symmetric cipher. In a public token, this data is unencrypted.

            So if you generate the token as in the code snippet you posted (local token, with a symmetric key), then payload will be encrypted (you won't be able to see it unless you know the symmetric key and use that one to decrypt it).

            If you use a public/private key pair, then payload will not be encrypted, so you'll be able to see it without the key (but you'll not be able to change it and sign it again without knowing the private key).

            Source https://stackoverflow.com/questions/57048911

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install paseto

            Lets start with an example of creating a basic Paseto JsonToken. For this example we'll use a local token (encrypted) variant and the latest version (2).

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/atholbro/paseto.git

          • CLI

            gh repo clone atholbro/paseto

          • sshUrl

            git@github.com:atholbro/paseto.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link