Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Shay_Levin
Admin
Admin

WAF Validates JWT Tokens (Configuration + 4 Attack Scenarios)

Learn how Check Point CloudGuard WAF enforces JWT authentication at the edge , blocking forged, expired, and unauthenticated API requests before they ever reach your backend.

In this video, we cover:

  • How CloudGuard WAF performs existence, expiration, and signature verification
  • Step-by-step configuration in the Check Point Infinity Portal
  • Live demo against 4 attack scenarios: – No token (existence check)
  • Expired token (5-minute clock-skew tolerance)
  • Token signed with the wrong RSA key (signature verification)
  • Valid token (happy path)
  • How blocked requests appear in the Events log

🔗 Useful Links CloudGuard WAF Authentication Enforcement docs: https://waf-doc.inext.checkpoint.com/additional-security-engines/api-protection/authentication-enfor...

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events