Junilu Lacar wrote:Here's a relevant quote from author/speaker Neal Ford:
Your database schema is one of the most intense implementation details of your entire architecture. And the more you let implementation details leak out, the more brittle your architecture becomes
Al Hobbs wrote:Usually the built in git ui is pretty good in IDEs. What are you using for programming?
Stephan van Hulst wrote:
I'm more concerned about what you mean by validating the token. Who signs the token? You? A third party? Is the party that signs the token also the holder of the protected resource?
In case you neither do the signing nor hold the protected resource, then why are you validating the token at all? Just pass it on to the holder of the protected resource.