Customer identity and access management (CIAM) providers everywhere are pushing JWTs as the silver bullet for everything. JWTs are pretty cool, but let's talk about some of the downsides of JWTs and other solutions you might consider.
Learn everything you need to know about authentication, authorization, identity, and access management from our team of industry experts. Jump start your development and get back to building something awesome.
Token Articles
Everything you need to know to implement software tokens for secure authentication.
Pros and Cons of JWTs
Revoking JWTs
We've been talking with developers about JSON Web Tokens (JWTs) recently and a one question keeps coming up: 'How do I revoke a JWT?' If you search online, you'll find a couple different possibilities, but let's take a closer look at the details.
Building a Secure Signed JWT
JSON Web Tokens (JWTs) are extremely configurable. As a producer or consumer of JWTs, what should you do to make sure that a signed JWT is secure?
Papers, Guides & Resources
Auth is complex. We share everything we know.
FusionAuth is Auth Built for <devs>
FusionAuth gives devs complete flexibility with minimal implementation effort. Use our Fast Path install to get started in minutes.
GET STARTED FOR FREE