Once you have a properly authenticated user, you also have a target for an
attacker. If an attacker can infiltrate an authenticated session, he can do
anything that user is allowed to do. So it's important to protect sessions by
generating safe session identifiers, not exposing them, and managing the lifecycle
of sessions.
more…
Published on September 12, 2016 07:40