Identiverse
register for 2026
CyberRisk Alliance
The Event Workshops About Us
Attending Companies NHI Pavilion
Partners Speakers Sponsors
Topics Venue VIP Program Women in Identity Summit
AI and Identity Continuous Identity Non-Human Identity
Personal Identity SANS Executive
Advisory Board Blog
Media Press Releases Profiles in Action
Videos Webinars Who We Are
Identiverse
Home
The Event
Attending Companies NHI Pavilion Partners Speakers Sponsors Topics Venue VIP Program Women in Identity Summit
Workshops
AI and Identity Continuous Identity Non-Human Identity Personal Identity SANS Executive
About Us
Advisory Board Blog Media Press Releases Profiles in Action Videos Webinars Who We Are
Identiverse 2025 • Session
How to Enhance Security with Transaction Tokens
Back to Main Agenda
Wednesday, June 4
Mandalay Bay H
4:35 pm - 5 pm
Naveen CM
Sr Principal Software Engineer
Yahoo

In the evolving landscape of cyber security and identity, Yahoo adopted the use of transaction tokens to enhance the security of user data, and mitigate risks associated with traditional authorization models. This presentation will delve into the concept of transaction tokens, why we implemented them at scale, and the security benefits they offer. By replacing cookies and access tokens with short-lived, encrypted JWT tokens, Yahoo aims to reduce vulnerabilities such as internal cookie exposure, replay attacks, and server-side request forgery. The session will provide a comprehensive overview of the end-to-end solution, use cases, and the lessons learned during the adoption journey. We will cover the following key areas:

  • An overview of Yahoo's current authorization model, and the security gaps identified.
  • What are Transaction Tokens?: Definition, structure, and comparison with existing authorization methods.
  • How Transaction Tokens Work: Detailed explanation of the end-to-end solution, including the process of obtaining and verifying transaction tokens.
  • Use Cases and benefits: Practical applications in different services, highlighting the reduction of security risks.
  • Implementation and integration: Steps for integrating transaction tokens, including the development of validation libraries and transition plans.
  • Challenges and solutions: Addressing potential challenges, and strategies for a smooth rollout.

PowerPoint PDF

Ways to stay in touch
Attendee Info & Inquiries
Sponsor Customer Service
Sponsorship & Exhibition Sales
Identiverse
Stay informed on the latest event updates
Follow us on
LinkedIn X Facebook
Hosted by CyberRisk Alliance
© 2025 identiverse • Privacy Policy • Terms of Use
register for 2026