Cyber 2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

DEPARTMENT OF INFORMATICS

__________________________

BCSe II

CRYPTOLOGY AND CODING THEORY

ASSIGNMENT A2-02

PRACTICAL

26-06-2023
Assignment Question

As a computer programmer employed by eGA, your assignment is ensure the


integrity of students' data from IAA. Your task involves developing a web
page, where ISMS users can log in and access their information via JWT
authorization.

Requirements

The web page should meet the following requirements:

• Use Java.
• The web page should allow users to login via given ISMS endpoints.
• The web page should use JWT authorization to authenticate users.
• The web page should be secure.

Instructions

To complete this assignment, you will need to do the following:

1. Use this https://isms.iaa.ac.tz/ismsapi/hakiki.php endpoint to receive


the authorization token.

Sample payload endpoint 1


{"username":"bcsClass","password":"jaribuKuingia@bcs$$+++!XZty"}

Sample response endpoint 1


{"token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImlzbXNf
YXBwIiwiZXhwIjoxNjg0OTM3MTgzfQ.LkZ3venAX6wk5sdnWl0Xuv1vkhc8XsDe_BZ4dBjF
t3E"}
2. Use the token received from endpoint 1 and add to the authorization
header to the endpoint 2 : https://isms.iaa.ac.tz/ismsapi/ca.php

Sample Header endpoint 2


{"Authorization":"Bearer
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImlzbXNfYXBwIiwiZX
hwIjoxNjg0OTIyNDIxfQ.aqT0HHgdIZjm095qiFu-bbjMKyAtvrD1VBG__rDEnus"}

Sample Payload endpoint 2


{"username":"BCS_1000_2020","password":"nextlevo"}

Sample Response endpoint 2

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==

3. Parse the response from endpoint 2 then decrypt the response to get readable
data then, store all the values to your local database by encrypt the data to the
base64 string but when user view the page, should view the data as plain text.
4. Mode of submission: Presentation

You might also like