Justinas Kuizinas
Bachelor's degree in IT and Master's degree in Information and Information Technology Security.
Senior software developer and team lead of 9 Python tamers in Corner Case Technologies.
Python evangelist, which loves Flake8, MyPy, and security spice within automated amazing pipelines!
I actually have a toy snake on my work table
Session
When starting a new project - sooner or later you’ll probably come across a decision "How my platform users will get authorized?". In Corner Case Technologies we join client teams or take over other projects and probably have never seen the same implementation of an authorization twice. Even when starting projects on our own we like to try one or another library, which still results in different implementations sometimes. Eventually, this made me start thinking - should we really reinvent the wheel on authorization? This is definitely a huge topic, hence the main focus will be on JWT and OAuth2