Customer identity and access management (CIAM) providers everywhere are pushing JWTs as the silver bullet for everything. JWTs are pretty cool, but let's talk about some of the downsides of JWTs and other solutions you might consider.
Learn everything you need to know about authentication, authorization, identity, and access management from our team of industry experts. Jump start your development and get back to building something awesome.
Everything you need to know to implement software tokens for secure authentication.
We've been talking with developers about JSON Web Tokens (JWTs) recently and a one question keeps coming up: 'How do I revoke a JWT?' If you search online, you'll find a couple different possibilities, but let's take a closer look at the details.
JSON Web Tokens (JWTs) are extremely configurable. As a producer or consumer of JWTs, what should you do to make sure that a signed JWT is secure?