SlideShare a Scribd company logo
5 Easy Steps to Understanding JSON
Web Tokens (JWT)
In this article, the fundamentals of what JSON Web Tokens (JWT) are,
and why they are used will be explained. JWT are an important piece in
ensuring trust and security in your application. JWT allow claims, such
as user data, to be represented in a secure manner.
To explain how JWT work, let’s begin with an abstract definition.
Mikey Stecky-Efantis Follow
May 16, 2016 · 7 min read
A JSON Web Token (JWT) is a JSON object that is
defined in RFC 7519 as a safe way to represent a set
of information between two parties. The token is
composed of a header, a payload, and a signature.
Simply put, a JWT is just a string with the following format:
header.payload.signature
It should be noted that a double quoted string is actually considered a valid
JSON object.
To show how and why JWT are actually used, we will use a simple 3
entity example (see the below diagram). The entities in this example
are the user, the application server, and the authentication server. The
authentication server will provide the JWT to the user. With the JWT,
the user can then safely communicate with the application.
In this example, the user first signs into the authentication server using
the authentication server’s login system (e.g. username and password,
Facebook login, Google login, etc). The authentication server then
creates the JWT and sends it to the user. When the user makes API calls
to the application, the user passes the JWT along with the API call. In
this setup, the application server would be configured to verify that the
incoming JWT are created by the authentication server (the
verification process will be explained in more detail later). So, when
the user makes API calls with the attached JWT, the application can use
the JWT to verify that the API call is coming from an authenticated
user.
How an application uses JWT to verify the authenticity of a user.
Now, the JWT itself, and how it’s constructed and verified, will be
examined in more depth.
Step 1. Create the HEADER
The header component of the JWT contains information about how the
JWT signature should be computed. The header is a JSON object in the
following format:
In this JSON, the value of the “typ” key specifies that the object is a
JWT, and the value of the “alg” key specifies which hashing algorithm
is being used to create the JWT signature component. In our example,
we’re using the HMAC-SHA256 algorithm, a hashing algorithm that
uses a secret key, to compute the signature (discussed in more detail in
step 3).
Step 2. Create the PAYLOAD
The payload component of the JWT is the data that‘s stored inside the
JWT (this data is also referred to as the “claims” of the JWT). In our
example, the authentication server creates a JWT with the user
information stored inside of it, specifically the user ID.
1
2
3
4
{
"typ": "JWT",
"alg": "HS256"
}
In our example, we are only putting one claim into the payload. You can
put as many claims as you like. There are several different standard
claims for the JWT payload, such as “iss” the issuer, “sub” the subject,
and “exp” the expiration time. These fields can be useful when creating
JWT, but they are optional. See the wikipedia page on JWT for a more
detailed list of JWT standard fields.
Keep in mind that the size of the data will affect the overall size of the
JWT, this generally isn’t an issue but having excessively large JWT may
negatively affect performance and cause latency.
Step 3. Create the SIGNATURE
The signature is computed using the following pseudo code:
// signature algorithm
data = base64urlEncode( header ) + “.” + base64urlEncode(
payload )
hashedData = hash( data, secret )
signature = base64urlEncode( hashedData )
1
2
3
{
"userId": "b08f86af-35da-48f2-8fab-cef3904660bd"
}
The data inside the payload is referred to as the “claims” of the token.
What this algorithm does is base64url encodes the header and the
payload created in steps 1 and 2. The algorithm then joins the resulting
encoded strings together with a period (.) in between them. In our
pseudo code, this joined string is assigned to data. The data string is
hashed with the secret key using the hashing algorithm specified in the
JWT header. The resulting hashed data is assigned to hashedData. This
hashed data is then base64url encoded to produce the JWT signature.
In our example, both the header, and the payload are base64url
encoded as:
// header
eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9
// payload
eyJ1c2VySWQiOiJiMDhmODZhZi0zNWRhLTQ4ZjItOGZhYi1jZWYzOTA0NjYw
YmQifQ
Then, applying the specified signature algorithm with the secret key on
the period-joined encoded header and encoded payload, we get the
hashed data needed for the signature. In our case, this means applying
the HS256 algorithm, with the secret key set as the string “secret”, on
the data string to get the hashedData string. After, through base64url
encoding the hashedData string we get the following JWT signature:
// signature
-xN_h82PHVTCMA9vdoHrcZxH-x5mb11y1537t3rGzcM
Step 4. Put All Three JWT Components
Together
Now that we have created all three components, we can create the
JWT. Remembering the header.payload.signature structure of the JWT,
we simply need to combine the components, with periods (.)
separating them. We use the base64url encoded versions of the header
and of the payload, and the signature we arrived at in step 3.
// JWT Token
eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VySWQiOiJiMDhmODZ
hZi0zNWRhLTQ4ZjItOGZhYi1jZWYzOTA0NjYwYmQifQ.-
xN_h82PHVTCMA9vdoHrcZxH-x5mb11y1537t3rGzcM
You can try creating your own JWT through your browser at jwt.io.
Going back to our example, the authentication server can now send this
JWT to the user.
How does JWT protect our data?
It is important to understand that the purpose of using JWT is NOT to
hide or obscure data in any way. The reason why JWT are used is to
prove that the sent data was actually created by an authentic source.
As demonstrated in the previous steps, the data inside a JWT is
encoded and signed, not encrypted. The purpose of encoding data is
to transform the data’s structure. Signing data allows the data receiver
to verify the authenticity of the source of the data. So encoding and
signing data does NOT secure the data. On the other hand, the main
purpose of encryption is to secure the data and to prevent
unauthorized access. For a more detailed explanation of the differences
between encoding and encryption, and also for more information on
how hashing works, see this article.
Since JWT are signed and encoded only, and since
JWT are not encrypted, JWT do not guarantee any
security for sensitive data.
Step 5. Verifying the JWT
In our simple 3 entity example, we are using a JWT that is signed by the
HS256 algorithm where only the authentication server and the
application server know the secret key. The application server receives
the secret key from the authentication server when the application sets
up its authentication process. Since the application knows the secret
key, when the user makes a JWT-attached API call to the application,
the application can perform the same signature algorithm as in Step 3
on the JWT. The application can then verify that the signature obtained
from it’s own hashing operation matches the signature on the JWT
itself (i.e. it matches the JWT signature created by the authentication
server). If the signatures match, then that means the JWT is valid
which indicates that the API call is coming from an authentic source.
Otherwise, if the signatures don’t match, then it means that the
received JWT is invalid, which may be an indicator of a potential attack
on the application. So by verifying the JWT, the application adds a
layer of trust between itself and the user.
In Conclusion
We went over what JWT are, how they are created and validated, and
how they can be used to ensure trust between an application and its
users. This is a starting point for understanding the fundamentals of
JWT and why they are useful. JWT are just one piece of the puzzle in
ensuring trust and security in your application.
. . .
It should be noted that the JWT authentication setup described in this
article is using a symmetric key algorithm (HS256). You can also set up
your JWT authentication in a similar way except using an asymmetric
algorithm (such as RS256) where the authentication server has a secret
key, and the application server has a public key. Check out this Stack
Overflow question for a detailed breakdown of the differences between
using symmetric and asymmetric algorithms.
It should also be noted that JWT should be sent over HTTPS
connections (not HTTP). Having HTTPS helps prevents unauthorized
users from stealing the sent JWT by making it so that the
communication between the servers and the user cannot be
intercepted .
Also, having an expiration in your JWT payload, a short one in
particular, is important so that if old JWT ever get compromised, they
will be considered invalid and can no longer be used.
. . .
If you enjoyed this article and are writing handlers for AWS Lambda
and are implementing JWT, please check out our project: Vandium
Vandium: The Node.js Framework for AWS
Lamba
 
One of the most exciting new cloud technologies
over the last few years has been the emergence …
medium.com
5 easy steps to understanding json web tokens (jwt)
5 easy steps to understanding json web tokens (jwt)

More Related Content

What's hot (20)

PPTX
Node.js Event Emitter
Eyal Vardi
 
PDF
GraalVM: Run Programs Faster Everywhere
J On The Beach
 
PDF
Spring boot 를 적용한 전사모니터링 시스템 backend 개발 사례
Jemin Huh
 
PDF
Faster PHP apps using Queues and Workers
Richard Baker
 
PDF
Selenium Page Object Model Using Page Factory | Selenium Tutorial For Beginne...
Edureka!
 
PPTX
What Is Express JS?
Simplilearn
 
PDF
Redis Lua Scripts
Itamar Haber
 
PPT
1 java servlets and jsp
Ankit Minocha
 
PPTX
Spring data jpa
Jeevesh Pandey
 
PPTX
An Overview on Nuxt.js
Squash Apps Pvt Ltd
 
PPTX
Json Web Token - JWT
Prashant Walke
 
PDF
Complete Java Course
Lhouceine OUHAMZA
 
PDF
Cours php
Yassine Badri
 
PDF
Self Healing Capabilities of Domino 10
Kim Greene Consulting, Inc.
 
PPTX
Best practices for RESTful web service design
Ramin Orujov
 
ODP
Building Netty Servers
Dani Solà Lagares
 
PDF
Spring Data JPA from 0-100 in 60 minutes
VMware Tanzu
 
PPTX
React hooks
Ramy ElBasyouni
 
PDF
Learn REST in 18 Slides
Suraj Gupta
 
PPTX
WEB SERVICE SOAP, JAVA, XML, JAXWS
Lhouceine OUHAMZA
 
Node.js Event Emitter
Eyal Vardi
 
GraalVM: Run Programs Faster Everywhere
J On The Beach
 
Spring boot 를 적용한 전사모니터링 시스템 backend 개발 사례
Jemin Huh
 
Faster PHP apps using Queues and Workers
Richard Baker
 
Selenium Page Object Model Using Page Factory | Selenium Tutorial For Beginne...
Edureka!
 
What Is Express JS?
Simplilearn
 
Redis Lua Scripts
Itamar Haber
 
1 java servlets and jsp
Ankit Minocha
 
Spring data jpa
Jeevesh Pandey
 
An Overview on Nuxt.js
Squash Apps Pvt Ltd
 
Json Web Token - JWT
Prashant Walke
 
Complete Java Course
Lhouceine OUHAMZA
 
Cours php
Yassine Badri
 
Self Healing Capabilities of Domino 10
Kim Greene Consulting, Inc.
 
Best practices for RESTful web service design
Ramin Orujov
 
Building Netty Servers
Dani Solà Lagares
 
Spring Data JPA from 0-100 in 60 minutes
VMware Tanzu
 
React hooks
Ramy ElBasyouni
 
Learn REST in 18 Slides
Suraj Gupta
 
WEB SERVICE SOAP, JAVA, XML, JAXWS
Lhouceine OUHAMZA
 

Similar to 5 easy steps to understanding json web tokens (jwt) (20)

PDF
Landscape
Amit Gupta
 
PDF
Landscape
Amit Gupta
 
PDF
Jwt the complete guide to json web tokens
remayssat
 
PPTX
JsonWebTokens ppt - explains JWT, JWS , JWE Tokens
nagarajapallafl
 
PDF
JSON WEB TOKEN
Knoldus Inc.
 
PPTX
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
SohailCreation
 
PDF
How to implement golang jwt authentication and authorization
Katy Slemon
 
PDF
Jwt Security
Seid Yassin
 
PPTX
Json web tokens
ElieHannouch
 
PPTX
Uniface Lectures Webinar - Application & Infrastructure Security - JSON Web T...
Uniface
 
PDF
Jwt with flask slide deck - alan swenson
Jeffrey Clark
 
PDF
Using JSON Web Tokens for REST Authentication
Mediacurrent
 
PPTX
Understanding JWT Exploitation
AkshaeyBhosale
 
PDF
Angular - Chapter 9 - Authentication and Authorization
WebStackAcademy
 
PDF
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
Varun Mithran
 
PPTX
Restful api
Anurag Srivastava
 
PPTX
Microservices Security Patterns & Protocols with Spring & PCF
VMware Tanzu
 
PPT
Securing RESTful API
Muhammad Zbeedat
 
PPTX
JWTs and JOSE in a flash
Evan J Johnson (Not a CISSP)
 
PDF
[WSO2 API Manager Community Call] Mastering JWTs with WSO2 API Manager
WSO2
 
Landscape
Amit Gupta
 
Landscape
Amit Gupta
 
Jwt the complete guide to json web tokens
remayssat
 
JsonWebTokens ppt - explains JWT, JWS , JWE Tokens
nagarajapallafl
 
JSON WEB TOKEN
Knoldus Inc.
 
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
SohailCreation
 
How to implement golang jwt authentication and authorization
Katy Slemon
 
Jwt Security
Seid Yassin
 
Json web tokens
ElieHannouch
 
Uniface Lectures Webinar - Application & Infrastructure Security - JSON Web T...
Uniface
 
Jwt with flask slide deck - alan swenson
Jeffrey Clark
 
Using JSON Web Tokens for REST Authentication
Mediacurrent
 
Understanding JWT Exploitation
AkshaeyBhosale
 
Angular - Chapter 9 - Authentication and Authorization
WebStackAcademy
 
JWT stands for JSON Web Token. It's a compact, URL-safe means of representing...
Varun Mithran
 
Restful api
Anurag Srivastava
 
Microservices Security Patterns & Protocols with Spring & PCF
VMware Tanzu
 
Securing RESTful API
Muhammad Zbeedat
 
JWTs and JOSE in a flash
Evan J Johnson (Not a CISSP)
 
[WSO2 API Manager Community Call] Mastering JWTs with WSO2 API Manager
WSO2
 
Ad

Recently uploaded (20)

PPTX
法国电子毕业证巴黎第二大学成绩单激光标Paris 2学费发票办理学历认证
Taqyea
 
PPTX
photography Portrait experimental approaches
emailkatewatkins
 
PPTX
Lec24_Software Configuration Management (1).pptx
khanjahanzaib1
 
PDF
Strip Zagor EXTRA 328 - Sveto stablo.pdf
Stripovizijacom
 
PPTX
Subject_Verb_Agreement_Presentation.pptx
aryanc4560
 
PPTX
preporting 21st century aira and joseph clasio.pptx
jamescarllfelomino6
 
PPT
HIV ppt.ppt.............................................
dan510639
 
PDF
Zagor strip VC 187 - Licem u lice.pdf
Stripovizijacom
 
PPTX
DEVELOPMENT OF DIFFERENT ART FORMS.pptxDEVELOPMENT OF DIFFERENT ART FORMS.pptx
MJEsquilloLaygo
 
PDF
Discover the Power of Vignettes in Model Making.pdf
Maadhu Creatives-Model Making Company
 
PDF
5f2794a4d09cf.pdfgggggggggggggggggggggggggggggggggg
epicstoryblock
 
PPTX
The Dynamic Career of Phil LaMarr
DPN Talent
 
PPTX
HRPTA-MEETING-24-25.pptx meeting and others
RizaRivas4
 
PDF
Strip Zagor EXTRA 330 - Dan otkupa.pdf
Stripovizijacom
 
PDF
strip Zagor EXTRA 335 - Omča.pdf
StripovizijaStripovi
 
PPTX
一比一原版(Oxon毕业证书)牛津大学毕业证如何办理
Taqyea
 
DOCX
legiimate crypto recovery expert. recuva hacker solutions
camilamichaelj7
 
PDF
strip Zagor EXTRA 333 - Prokleto zlato.pdf
StripovizijaStripovi
 
PPTX
The Victoriannnnnnnnnnnnnnnnnnnn Age.pptx
AlbertoTierra
 
PDF
El folclore dominicano cobra vida en cada trazo, con una paleta de colores qu...
EusebioVidal1
 
法国电子毕业证巴黎第二大学成绩单激光标Paris 2学费发票办理学历认证
Taqyea
 
photography Portrait experimental approaches
emailkatewatkins
 
Lec24_Software Configuration Management (1).pptx
khanjahanzaib1
 
Strip Zagor EXTRA 328 - Sveto stablo.pdf
Stripovizijacom
 
Subject_Verb_Agreement_Presentation.pptx
aryanc4560
 
preporting 21st century aira and joseph clasio.pptx
jamescarllfelomino6
 
HIV ppt.ppt.............................................
dan510639
 
Zagor strip VC 187 - Licem u lice.pdf
Stripovizijacom
 
DEVELOPMENT OF DIFFERENT ART FORMS.pptxDEVELOPMENT OF DIFFERENT ART FORMS.pptx
MJEsquilloLaygo
 
Discover the Power of Vignettes in Model Making.pdf
Maadhu Creatives-Model Making Company
 
5f2794a4d09cf.pdfgggggggggggggggggggggggggggggggggg
epicstoryblock
 
The Dynamic Career of Phil LaMarr
DPN Talent
 
HRPTA-MEETING-24-25.pptx meeting and others
RizaRivas4
 
Strip Zagor EXTRA 330 - Dan otkupa.pdf
Stripovizijacom
 
strip Zagor EXTRA 335 - Omča.pdf
StripovizijaStripovi
 
一比一原版(Oxon毕业证书)牛津大学毕业证如何办理
Taqyea
 
legiimate crypto recovery expert. recuva hacker solutions
camilamichaelj7
 
strip Zagor EXTRA 333 - Prokleto zlato.pdf
StripovizijaStripovi
 
The Victoriannnnnnnnnnnnnnnnnnnn Age.pptx
AlbertoTierra
 
El folclore dominicano cobra vida en cada trazo, con una paleta de colores qu...
EusebioVidal1
 
Ad

5 easy steps to understanding json web tokens (jwt)

  • 1. 5 Easy Steps to Understanding JSON Web Tokens (JWT) In this article, the fundamentals of what JSON Web Tokens (JWT) are, and why they are used will be explained. JWT are an important piece in ensuring trust and security in your application. JWT allow claims, such as user data, to be represented in a secure manner. To explain how JWT work, let’s begin with an abstract definition. Mikey Stecky-Efantis Follow May 16, 2016 · 7 min read
  • 2. A JSON Web Token (JWT) is a JSON object that is defined in RFC 7519 as a safe way to represent a set of information between two parties. The token is composed of a header, a payload, and a signature. Simply put, a JWT is just a string with the following format: header.payload.signature It should be noted that a double quoted string is actually considered a valid JSON object. To show how and why JWT are actually used, we will use a simple 3 entity example (see the below diagram). The entities in this example are the user, the application server, and the authentication server. The authentication server will provide the JWT to the user. With the JWT, the user can then safely communicate with the application.
  • 3. In this example, the user first signs into the authentication server using the authentication server’s login system (e.g. username and password, Facebook login, Google login, etc). The authentication server then creates the JWT and sends it to the user. When the user makes API calls to the application, the user passes the JWT along with the API call. In this setup, the application server would be configured to verify that the incoming JWT are created by the authentication server (the verification process will be explained in more detail later). So, when the user makes API calls with the attached JWT, the application can use the JWT to verify that the API call is coming from an authenticated user. How an application uses JWT to verify the authenticity of a user.
  • 4. Now, the JWT itself, and how it’s constructed and verified, will be examined in more depth. Step 1. Create the HEADER The header component of the JWT contains information about how the JWT signature should be computed. The header is a JSON object in the following format: In this JSON, the value of the “typ” key specifies that the object is a JWT, and the value of the “alg” key specifies which hashing algorithm is being used to create the JWT signature component. In our example, we’re using the HMAC-SHA256 algorithm, a hashing algorithm that uses a secret key, to compute the signature (discussed in more detail in step 3). Step 2. Create the PAYLOAD The payload component of the JWT is the data that‘s stored inside the JWT (this data is also referred to as the “claims” of the JWT). In our example, the authentication server creates a JWT with the user information stored inside of it, specifically the user ID. 1 2 3 4 { "typ": "JWT", "alg": "HS256" }
  • 5. In our example, we are only putting one claim into the payload. You can put as many claims as you like. There are several different standard claims for the JWT payload, such as “iss” the issuer, “sub” the subject, and “exp” the expiration time. These fields can be useful when creating JWT, but they are optional. See the wikipedia page on JWT for a more detailed list of JWT standard fields. Keep in mind that the size of the data will affect the overall size of the JWT, this generally isn’t an issue but having excessively large JWT may negatively affect performance and cause latency. Step 3. Create the SIGNATURE The signature is computed using the following pseudo code: // signature algorithm data = base64urlEncode( header ) + “.” + base64urlEncode( payload ) hashedData = hash( data, secret ) signature = base64urlEncode( hashedData ) 1 2 3 { "userId": "b08f86af-35da-48f2-8fab-cef3904660bd" } The data inside the payload is referred to as the “claims” of the token.
  • 6. What this algorithm does is base64url encodes the header and the payload created in steps 1 and 2. The algorithm then joins the resulting encoded strings together with a period (.) in between them. In our pseudo code, this joined string is assigned to data. The data string is hashed with the secret key using the hashing algorithm specified in the JWT header. The resulting hashed data is assigned to hashedData. This hashed data is then base64url encoded to produce the JWT signature. In our example, both the header, and the payload are base64url encoded as: // header eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9 // payload eyJ1c2VySWQiOiJiMDhmODZhZi0zNWRhLTQ4ZjItOGZhYi1jZWYzOTA0NjYw YmQifQ Then, applying the specified signature algorithm with the secret key on the period-joined encoded header and encoded payload, we get the hashed data needed for the signature. In our case, this means applying the HS256 algorithm, with the secret key set as the string “secret”, on the data string to get the hashedData string. After, through base64url encoding the hashedData string we get the following JWT signature:
  • 7. // signature -xN_h82PHVTCMA9vdoHrcZxH-x5mb11y1537t3rGzcM Step 4. Put All Three JWT Components Together Now that we have created all three components, we can create the JWT. Remembering the header.payload.signature structure of the JWT, we simply need to combine the components, with periods (.) separating them. We use the base64url encoded versions of the header and of the payload, and the signature we arrived at in step 3. // JWT Token eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VySWQiOiJiMDhmODZ hZi0zNWRhLTQ4ZjItOGZhYi1jZWYzOTA0NjYwYmQifQ.- xN_h82PHVTCMA9vdoHrcZxH-x5mb11y1537t3rGzcM You can try creating your own JWT through your browser at jwt.io. Going back to our example, the authentication server can now send this JWT to the user. How does JWT protect our data?
  • 8. It is important to understand that the purpose of using JWT is NOT to hide or obscure data in any way. The reason why JWT are used is to prove that the sent data was actually created by an authentic source. As demonstrated in the previous steps, the data inside a JWT is encoded and signed, not encrypted. The purpose of encoding data is to transform the data’s structure. Signing data allows the data receiver to verify the authenticity of the source of the data. So encoding and signing data does NOT secure the data. On the other hand, the main purpose of encryption is to secure the data and to prevent unauthorized access. For a more detailed explanation of the differences between encoding and encryption, and also for more information on how hashing works, see this article. Since JWT are signed and encoded only, and since JWT are not encrypted, JWT do not guarantee any security for sensitive data. Step 5. Verifying the JWT In our simple 3 entity example, we are using a JWT that is signed by the HS256 algorithm where only the authentication server and the application server know the secret key. The application server receives the secret key from the authentication server when the application sets up its authentication process. Since the application knows the secret key, when the user makes a JWT-attached API call to the application, the application can perform the same signature algorithm as in Step 3 on the JWT. The application can then verify that the signature obtained
  • 9. from it’s own hashing operation matches the signature on the JWT itself (i.e. it matches the JWT signature created by the authentication server). If the signatures match, then that means the JWT is valid which indicates that the API call is coming from an authentic source. Otherwise, if the signatures don’t match, then it means that the received JWT is invalid, which may be an indicator of a potential attack on the application. So by verifying the JWT, the application adds a layer of trust between itself and the user. In Conclusion We went over what JWT are, how they are created and validated, and how they can be used to ensure trust between an application and its users. This is a starting point for understanding the fundamentals of JWT and why they are useful. JWT are just one piece of the puzzle in ensuring trust and security in your application. . . . It should be noted that the JWT authentication setup described in this article is using a symmetric key algorithm (HS256). You can also set up your JWT authentication in a similar way except using an asymmetric algorithm (such as RS256) where the authentication server has a secret key, and the application server has a public key. Check out this Stack Overflow question for a detailed breakdown of the differences between using symmetric and asymmetric algorithms. It should also be noted that JWT should be sent over HTTPS connections (not HTTP). Having HTTPS helps prevents unauthorized
  • 10. users from stealing the sent JWT by making it so that the communication between the servers and the user cannot be intercepted . Also, having an expiration in your JWT payload, a short one in particular, is important so that if old JWT ever get compromised, they will be considered invalid and can no longer be used. . . . If you enjoyed this article and are writing handlers for AWS Lambda and are implementing JWT, please check out our project: Vandium Vandium: The Node.js Framework for AWS Lamba   One of the most exciting new cloud technologies over the last few years has been the emergence … medium.com