What is multipart upload and how do you use it?
Multipart upload chunks files to the server and is great for sending media
What is JWT PoP, why do you use and how does it work?
What is a nonce?
A number used once. This can prevent replay attacks by aadding a nonce for each call.
these are typically signed by the private key.
How do we ensure zero trust & high security auth
Use Oauth2 + pop with a client-stored private key.
Use short lived oauth2 tokens and rotate pop private keys often.
If an attacker steals private key and oauth2 token they will have until one of the above changes to impersonate the user.
Can also use device fingerprinting to identify devices
Discuss Attack and Mitigation Flow
.
📌 Breakdown of the Attack & Mitigation Flow
1️⃣ User logs into an OAuth2 provider (Google, Facebook, etc.)
2️⃣ OAuth2 provider issues an OAuth2 access token to the client
3️⃣ Client uses its private PoP key to sign API requests
4️⃣ API server verifies both the OAuth2 token and PoP signature