Arama Sonuçları: "#JSONWebToken"

13 sonuç
KISHAN PATEL
KISHAN PATEL@KISHANPATEL005·
JWT is dead? 😳 Just watched a great breakdown on PASETO tokens. It seems they solve some major security issues and algorithm headaches with JWT. What are your thoughts on switching to PASETO? Is JWT still king? 🚀 #coding #jsonwebtoken #PASETO #webdevelopment
English
0
0
0
14
Manav
Manav@purplematrix_·
Just a surface knowledge about, JWT. Its just a encoding not a encryption. #JsonWebToken #JWT => What is JWT?? JWT (JSON Web Token) is a compact, URL-safe token format used for authentication and authorization. --Structure: header.payload.signature It is: 1.) Stateless 2.)Digitally signed 3.)Base64URL encoded -> JWT Has 3 Parts 🔹 Header (Metadata) { "alg": "HS256", "typ": "JWT" } It explain about the algorithm used for encoding. 🔹 Payload (Claims) { "userId": "123", "role": "admin", "iat": 1700000000, "exp": 1700003600 } It contains the data we have given to encoded as payload. ->Payload is NOT encrypted. Its encoded , anyone can decode it. 🔹 Signature (Security Layer) ->Actually , this is the main part, which verify that data has not been tampered with. For HS256: Signature = HMACSHA256( Base64Url(header) + "." + Base64Url(payload), SECRET ) =>>Anyone can decode a JWT payload because it is only Base64URL encoded — not encrypted. The data inside is readable by design. But readable does not mean editable. No one can tamper with the token — for example, changing a user’s role from "user" to "admin" — unless they have the JWT secret key. If even a single character in the payload is modified, the token becomes invalid and the server will reject it during verification. That’s the role of the JWT secret key: It ensures integrity and prevents unauthorized modification. JWT payloads are transparent. But without the secret, they are not forgeable. =>>Encoding vs Encryption JWT uses Base64URL encoding, not encryption. Encoding = reversible formatting Encryption = secret-based protection Anyone can decode: Base64Url^{-1}(payload) But only someone with the secret can generate a valid signature. =>> Authentication Flow User logs in Server validates credentials Server generates token: jwt.sign({ userId, role }, SECRET, { expiresIn: "1h" }) Client sends token in header: Authorization: Bearer Server verifies jwt.verify(token, SECRET) If valid → access granted. =>> Authentication ≠ Authorization Verification checks: Signature valid? Token expired? Authorization checks: Is role = admin? Does user have permission? You must do both. =>> Why JWT Is Called Stateless Server does NOT store session. All required identity info is inside token. That means: No session DB lookup Horizontally scalable Works well in microservices ==> That's all.
English
0
0
1
42
Hemant
Hemant@HKsoldev·
Where to store the json token in the user end for better security 1. local Storage 2. Index DB 3. Cookie 4.Other option Tell in Comment ? #jsonwebtoken #authentication
English
1
0
4
50
Sameer Verma
Sameer Verma@sameerverma1258·
The HTTP backend uses Express, Prisma, Zod, bcrypt, and JWT for authentication and room management. Shared schemas keep client and server aligned, making the flow simple, secure, and reliable #bcrypt #jsonwebtoken
English
1
0
0
4
Afroz Quraishi
Afroz Quraishi@AfrozQuraishi_·
JWT is used for authentication and authorization. It’s not encrypted, so anyone with the token can read its data. But it has a digital signature that proves it. This makes it trustworthy. Never put sensitive info in it. Always use HTTPS to protect it. #jsonwebtoken #jwt #security
English
0
0
1
41
Fabio E. Zola
Fabio E. Zola@equant_org·
@sahnlam The three parts of a JSON Web Token (JWT): Header, payload, and signature. Requiring a valid JWT token for access to protected API endpoints is one of the strategy you can use for implementing JWT in RESTful APIs. #jwt #JSONWebToken
English
0
0
0
15
Robin Suthar
Robin Suthar@RobinSutharSd·
understanding JSON web tokens. Is that how it works? My question is do we store it in a database or a local storage? I think it would be local storage. and are supposed to work this way? #jsonwebtoken
Robin Suthar tweet media
English
0
0
0
102