October 2020
Beginner to intermediate
560 pages
14h 52m
English
This chapter covers
Validating tokens using cryptographic signatures
Using JSON Web Tokens in the OAuth 2 architecture
Signing tokens with symmetric and asymmetric keys
Adding custom details to a JWT
In this chapter, we’ll discuss using JSON Web Tokens (JWTs) for token implementation. You learned in chapter 14 that the resource server needs to validate tokens issued by the authorization server. And I told you three ways to do this:
Using direct calls between the resource server and the authorization server, which we implemented in section 14.2
Using a shared database for storing the tokens, which we implemented in section 14.3
Using cryptographic signatures, which we’ll discuss ...
Read now
Unlock full access