Navigating Machine-to-Machine Security cover art

Navigating Machine-to-Machine Security

Navigating Machine-to-Machine Security

Listen for free

View show details

About this listen

In this episode, Seb and Abram Douglas dive deep into OAuth 2.0 and the challenges of machine-to-machine (M2M) authentication. They unpack the security trade-offs between API keys and the client credentials grant flow, explaining how Amazon Cognito can generate time-bound access tokens and use Lambda triggers for token customization. The conversation highlights token claims, secure verification methods, and how API Gateway integrates with Cognito for simplified authorization. Seb and Abram also explore fine-grained access control using Amazon Verified Permissions and outline best practices like securing secrets with AWS Secrets Manager, rotating client credentials, and enabling AWS WAF. Finally, they look ahead to the role of AI agents in secure M2M communication, stressing the importance of user consent, identity propagation, and robust token management in future architectures.

What listeners say about Navigating Machine-to-Machine Security

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.