<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WAF Validates JWT Tokens (Configuration + 4 Attack Scenarios) in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/WAF-Validates-JWT-Tokens-Configuration-4-Attack-Scenarios/m-p/276257#M402</link>
    <description>&lt;P&gt;Learn how Check Point CloudGuard WAF enforces JWT authentication at the edge , blocking forged, expired, and unauthenticated API requests before they ever reach your backend.&lt;/P&gt;
&lt;P&gt;In this video, we cover:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How CloudGuard WAF performs existence, expiration, and signature verification&lt;/LI&gt;
&lt;LI&gt;Step-by-step configuration in the Check Point Infinity Portal&lt;/LI&gt;
&lt;LI&gt;Live demo against 4 attack scenarios: – No token (existence check)&lt;/LI&gt;
&lt;LI&gt;Expired token (5-minute clock-skew tolerance)&lt;/LI&gt;
&lt;LI&gt;Token signed with the wrong RSA key (signature verification)&lt;/LI&gt;
&lt;LI&gt;Valid token (happy path)&lt;/LI&gt;
&lt;LI&gt;How blocked requests appear in the Events log&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; Useful Links CloudGuard WAF Authentication Enforcement docs: &lt;A href="https://waf-doc.inext.checkpoint.com/additional-security-engines/api-protection/authentication-enforcement" target="_blank" rel="noopener"&gt;https://waf-doc.inext.checkpoint.com/additional-security-engines/api-protection/authentication-enforcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FHBmoJWkcghc%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHBmoJWkcghc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FHBmoJWkcghc%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="How Check Point CloudGuard WAF Validates JWT Tokens (Configuration + 4 Attack Scenarios)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2026 12:11:15 GMT</pubDate>
    <dc:creator>Shay_Levin</dc:creator>
    <dc:date>2026-04-29T12:11:15Z</dc:date>
    <item>
      <title>WAF Validates JWT Tokens (Configuration + 4 Attack Scenarios)</title>
      <link>https://community.checkpoint.com/t5/WAF/WAF-Validates-JWT-Tokens-Configuration-4-Attack-Scenarios/m-p/276257#M402</link>
      <description>&lt;P&gt;Learn how Check Point CloudGuard WAF enforces JWT authentication at the edge , blocking forged, expired, and unauthenticated API requests before they ever reach your backend.&lt;/P&gt;
&lt;P&gt;In this video, we cover:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How CloudGuard WAF performs existence, expiration, and signature verification&lt;/LI&gt;
&lt;LI&gt;Step-by-step configuration in the Check Point Infinity Portal&lt;/LI&gt;
&lt;LI&gt;Live demo against 4 attack scenarios: – No token (existence check)&lt;/LI&gt;
&lt;LI&gt;Expired token (5-minute clock-skew tolerance)&lt;/LI&gt;
&lt;LI&gt;Token signed with the wrong RSA key (signature verification)&lt;/LI&gt;
&lt;LI&gt;Valid token (happy path)&lt;/LI&gt;
&lt;LI&gt;How blocked requests appear in the Events log&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; Useful Links CloudGuard WAF Authentication Enforcement docs: &lt;A href="https://waf-doc.inext.checkpoint.com/additional-security-engines/api-protection/authentication-enforcement" target="_blank" rel="noopener"&gt;https://waf-doc.inext.checkpoint.com/additional-security-engines/api-protection/authentication-enforcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FHBmoJWkcghc%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHBmoJWkcghc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FHBmoJWkcghc%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="How Check Point CloudGuard WAF Validates JWT Tokens (Configuration + 4 Attack Scenarios)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 12:11:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/WAF-Validates-JWT-Tokens-Configuration-4-Attack-Scenarios/m-p/276257#M402</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2026-04-29T12:11:15Z</dc:date>
    </item>
  </channel>
</rss>

