- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`This publicly exposed API endpoint accepts JWT signed using HMAC and a symmetric key (such as HS256
).
Although not vulnerable in themselves and very easy to setup, this model comes with limitations that have to be considered in the design.
The signature is generated using a secret string that has to be shared with any one validating the secret. That means anyone able to validate the JWT is also able to modify it. This could become a problem in case of compromise, or if the validator isn’t totally trusted.
Moreover, this setup is vulnerable to having malicious actor bruteforce the secret offline. The secret should be long (at least 40 characters) and as random as possible.
If the security limitations are not acceptable, we recommend you migrate to an asymmetric encryption scheme (RSA or ECDSA) where the secret is stronger and the validation may be achieved without disclosing the private key that would enable the generation of new JWTs.