20

Understand JWT in 3 Minutes

 4 years ago
source link: https://tahazsh.com/understand-jwt-in-3-minutes
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

I'm going to avoid jargon here as much as I can. So let me explain things in simple words.

What is JWT?

It's a token, or let's say it's a string that if you, the user of the app, own it, then you can access or update certain things on the server.

For example, if you want to update your profile picture, you should have the token that allows your account to update that profile picture.

Where does the user get this token from?

The server generates it for the user.

When does the server generate it?

When the user proves to the server that he or she can get one. This typically happens when the user logs in to the app.

So when the user fills in the username/password and presses log in, the server checks that they are correct, and if so, the server generates the token and sends it in the response of that log-in request.

What should the user do with the token?

The user should embed it with every request sent to the server. (Or at least with the requests that require authorization.)

How to embed it?

Typically, you would include it in the header of the request, specifically the Authorization field.

If I have to include this token with every request, where should I store it?

Typically, you would store it in the localStorage, after the user logs in and gets the token.

If I don't store it, should the user log in every time the page is reloaded?

Yep!

How can the server know that the included token can access a specific user's resources?

When the server generates the token, it includes the user's email, username, etc (anything it can identify the user with). So, for example, if the token contains your email address, then you can access only stuff related to the user with your email address.

So can the token hold data?

Yes it can, inside the payload section.

If someone stole my token, can they access my stuff?

Yes they can!

How can the server be sure that the user's token wasn't modified before it's sent?

When the server generates the token, it digitally signs it with a secret key.

I can dive further into what a digital signature is and how it's generated, but let's keep things simple here and just keep in mind that if you have a token and you modified it, the server won't give you access to anything because the token has been changed.

If I tried to use this token after 10 years, would it still work?

Yes, it will be valid forever unless the server specifies an expiration time when generating it.

That's it!

If you have any questions, ask them in the comments.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK