Customer identity and access management (CIAM) providers everywhere are pushing JWTs as the silver bullet for everything. JWTs are pretty cool, but let's talk about some of the downsides of JWTs and other solutions you might consider.
Everything you need to know to implement software tokens for secure authentication.
We've been talking with developers about JSON Web Tokens (JWTs) recently and a one question keeps coming up: 'How do I revoke a JWT?' If you search online, you'll find a couple different possibilities, but let's take a closer look at the details.
JSON Web Tokens (JWTs) are extremely configurable. As a producer or consumer of JWTs, what should you do to make sure that a signed JWT is secure?
JSON Web Tokens (JWTs) look like gibberish. But they are actually quite structured, with a header, payload and signature.
There are a number of different ways to handle a token when it enters a microservices bounded context. You can pass it through, reissue it, or break it down.
FusionAuth is Auth Built For Devs
FusionAuth gives devs complete flexibility with minimal implementation effort. Use our fast path install to get started in minutes.