Too Long; Didn't Read
JWTs or JSON Web Tokens are most commonly used to identify an authenticated user. They are issued by an authentication server and are consumed by the client-server (to secure its APIs) Each JWT is also signed using cryptography (hashing) to ensure that the contents of the JWT contents (also known as JWT claims) cannot be altered by a client or a malicious party. We will make our own JWT from scratch later in this post. We discuss the structure of a JWT and how do they work (using an example)
Share Your Thoughts