klotz: authentication* + jwt*

Bookmarks on this page are managed by an admin user.

0 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. This blog post explains why JWTs (JSON Web Tokens) are not suitable for authorization despite their popularity in authentication scenarios. It discusses the proper use of JWTs for verification, the risks of misusing them for authorization, and alternative solutions.
  2. The article discusses the JSON Web Token (JWT), a self-contained authentication token used for secure communication between server and client. JWT consists of three parts: Header, Payload, and Signature.

    The header contains information about the token type and the hashing algorithm used for creating the signature. The payload contains user-specific information, such as issuer, subject, and expiration time, in a JSON object format. The signature is a key or token created by taking the header and payload and appending it with the secret key, which is then hashed using the hashing algorithm provided in the header.
    2024-06-05 Tags: , , by klotz

Top of the page

First / Previous / Next / Last / Page 1 of 0 SemanticScuttle - klotz.me: Tags: authentication + jwt

About - Propulsed by SemanticScuttle