Encapsulates the 3rd party JWT lib that we use and provides core JWT reading and writing functionality.
| License | BSD 3-clause |
|---|---|
| Categories | JWT Libraries |
| Tags | securityjsonatlassianauthenticationjwt |
| Date | Sep 24, 2024 |
| Files | pom (2 KB) jar (39 KB) View All |
| Repositories | AtlassianAtlassian ExternalAtlassian PublicLiferay PublicSpring Lib MSpring Lib ReleaseSpring Plugins |
| Ranking | #8721 in MvnRepository (See Top Artifacts) #13 in JWT Libraries |
| Used By | 59 artifacts |
| Vulnerabilities | Vulnerabilities from dependencies: CVE-2025-53864 CVE-2025-48924 CVE-2023-52428 View 7 more ... |
Note: this artifact is located at Atlassian repository (https://maven.artifacts.atlassian.com/)
Compile Dependencies (1)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| JWT Lib Apache 2.0 | com.nimbusds » nimbus-jose-jwt6 vulnerabilities | 2.16 | 10.6 |
Provided Dependencies (6)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| JWT Lib Apache 2.0 | com.atlassian.jwt » jwt-api | 1.0.1 | 5.0.5 | |
| Core Utils Apache 2.0 | com.google.guava » guava2 vulnerabilities | 10.0.1 | 33.5.0-jre | |
| Base64 Apache 2.0 | commons-codec » commons-codec | 1.7 | 1.20.0 | |
| Core Utils Apache 2.0 | commons-lang » commons-lang1 vulnerability | 2.6 | 3.20.0 | |
| Java Spec CDDLGPL 1.1GPL 2.0 | javax.servlet » servlet-api | 2.5 | 4.0.1 | |
| Logging MIT | org.slf4j » slf4j-api | 1.6.6 | 2.0.17 |
Test Dependencies (2)
| Category/License | Group / Artifact | Version | Updates | |
|---|---|---|---|---|
| Testing EPL 2.0 | junit » junit1 vulnerability | 4.11 | 6.0.1 | |
| Mocking MIT | org.mockito » mockito-core | 1.9.5 | 5.20.0 |
Licenses
| License | URL |
|---|---|
| BSD License | http://opensource.org/licenses/BSD-3-Clause |
Related Books
| Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy | |
| Unifying Business, Data, and Code: Designing Data Products with JSON Schema (2024) by Itelman, Ron, Viotti, Juan Cruz | |
| Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam | |
| The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner | |
| Json for Beginners: Your Guide to Easily Learn Json In 7 Days (Programming Languages) (2017) by Academy, iCode | |
| JSON at Work: Practical Data Integration for the Web (2017) by Marrs, Tom | |
| Introduction to JavaScript Object Notation: A To-the-Point Guide to JSON (2015) by Bassett, Lindsay | |
| Java Security (2nd Edition) (2001) by Oaks, Scott |