0% found this document useful (0 votes)
7 views8 pages

5 - Understanding - JWT (5.5) Suffix @fuckallresources

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

5 - Understanding - JWT (5.5) Suffix @fuckallresources

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Spring Security

Understanding
JWT
Why use JSON Web Token (JWT)

1. Stateless
2. Scalable in Distributed Systems
3. Cross domain authentication
4. Ideal for Decentralized systems and microservices
5. Highly secure
JSON Web Token (JWT)
JWT is a compact, URL-safe means of
representing claims to be transferred
between two parties.

JWT is often used to transmit non-sensitive


data that doesn't require confidentiality but
still needs integrity and authenticity. This
includes user identifiers, roles, permissions,
and other claims necessary for making
access control decisions.
JWT Creation
Sample Token:

eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiI0NSIsI
nJvbGVzIjpbIlJJREVSIl0sImlhdCI6MTcy
MTU2NzUxOSwiZXhwIjoxNzIxNTgxOTE
5fQ.pIEiLEboraXMhJrm8ckRLpoYSWC6n
9mY3XNlCpLFE4I
JWT Verification
Sample Token:

eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiI0NSIsI
nJvbGVzIjpbIlJJREVSIl0sImlhdCI6MTcy
MTU2NzUxOSwiZXhwIjoxNzIxNTgxOTE
5fQ.pIEiLEboraXMhJrm8ckRLpoYSWC6n
9mY3XNlCpLFE4I
Using JWT For Authentication
JWT Dependencies
.

You might also like