Customer identity and access management (CIAM) providers everywhere are pushing JWTs as the silver bullet for everything. JWTs are pretty cool, but let's talk about some of the downsides of JWTs and other solutions you might consider.
Token Articles
Everything you need to know to implement software tokens for secure authentication.
Pros and Cons of JWTs
Revoking JWTs
We've been talking with developers about JSON Web Tokens (JWTs) recently and a one question keeps coming up: 'How do I revoke a JWT?' If you search online, you'll find a couple different possibilities, but let's take a closer look at the details.
Building a Secure Signed JWT
JSON Web Tokens (JWTs) are extremely configurable. As a producer or consumer of JWTs, what should you do to make sure that a signed JWT is secure?
Components of JWT Tokens Explained
JSON Web Tokens (JWTs) look like gibberish. But they are actually quite structured, with a header, payload and signature.
Tokens at the Microservices Context Boundary
There are a number of different ways to handle a token when it enters a microservices bounded context. You can pass it through, reissue it, or break it down.
Papers, Guides & Resources
Auth is complex. We share everything we know.
FusionAuth is Auth Built For Devs
FusionAuth gives devs complete flexibility with minimal implementation effort. Use our fast path install to get started in minutes.