I really enjoy all your videos. You explain everything much better than most of the tutorials I buy on udemy. You should do your own tutorials on udemy because you're a much better teacher than most of the other people on that website.
Mr Kyle I'll like to ask you a question, in one of your video you titled 'JWT Authentication Tutorial - Node.js' but here you said JWT is for Authorization and not Authentication, I'm a bit confused here...
I work in the software industry and needed to understand JWT. Your tutorial is by far one of the best I've seen. Clear, concise and super easy to understand. Uber thank you!
Man you're really a godsend, how is it humanly possible to pack so much info AND explain it all so lucidly in 15 mins?! I read so many articles but they all made the verify signature sound like magic and here you simplify it like it's no big deal. Now I finally understand why jwt is important. Thank you so so much Kyle! 😃
this is one of the underrated explanations of jwt. as full stack engineer , I remember taking your react course 2 years ago where we were building a food application applying all the http verbs. now , I have been working for 7 months as full stack engineer here in seattle waghinston. if someone had told me , I will be a developer one day, I wouldn't have believed. thanks again
hello brother may you please assist me in my application used springboot security problem is after a successful login it's calling the login page again not redirecting to the specified endpoint. How can I share my classes with you
JWT in this tutorial is all about authentication, not authorization contrary to what was described, because its use here is identifying whether the user is the same user as the one that logged in (just like with sessions). Perhaps the confusion is that JWTs are commonly used for authorization by being created to grant access to APIs so that the API server knows the client is authorized to use the API. Neverthless, JWTs can be used for authentication (as in this tutorial) such as "ID tokens" and also for authorization such as "access tokens". A clear tutorial apart from this!
It was about Authorization only. Server creates a jwt after login only. Or I can say after authentication only. Server sends jwt back first time to client/browser after authenticated. Then the corresponding user reqs, Has a jwt in its header. Now server authorizes is it a valid jwt?. (But not does not validates user mail, user password). So the video description is correct. If i am missing something, correct me .😮
I love the way you started the video by explaining, JWT is meant for authorisation not authentication. It shows how hard you work for your content. Thank you and kudos to you..
Another use case for JWT is the following: - The client signs the JWT with their own private key - The client shares its public key with you, and you keep a copy on the server - Everytime you decode the JWT, you verify its validity with the copy of the public key that you have on the server
Any thing I get confused on, I check your page first. Your videos are really short and straight to the point with clear understanding. Thank you for putting out great content as always.
Was struggling to understand the concept of JWT since over 2 weeks, I'm glad I watched this tutorial. Complete concept of JWT has been cleared in my mind now. Thanks a lot for making it so clean and simple to understand.
Thanks for the great explanation on JWT. For the session cookie based solution, I think the session doesn't have to be stored in memory. Storage like Redis with TTL is a great option. So when a user tries to swtich from Bank to Retirement service, the services can both retrieve the user session from the same Redis cluster
You're really talented at this. I love this kind of tutorials, simple clear and brief without losing important details. Hope you continue providing such content.
Thankyou so much for this. I cant believe the difference between you explaining things vs my teachers. I finally get it now! It wasnt that difficult after all. I also love how you explain why you should use it & show us a few examples.
"Essentially we are storing the user information on the client" - that seems to be the sentence that finally got my head to wrap around this concept. Thank God for RUclips and your video, because I don't think my head could comprehend this heady subject by just reading.
Nice one Kyle, you speak so clearly and sound highly knowledgeable about JWT. Really appreciate the effort you put into your videos. Awesome. Keep up the good work.
My memory must be going, because this is like my 3rd time watching this video in the past few years. Just as helpful as ever, thanks for helping me keep my job. o7
A superb video for me to review this thing even I've been using it for a while. :P Btw I really love that you include graphic to illustrate the point, it is easier than just words. And I also like the servers of the bank example. :)
I am really glad you enjoyed the video and the visuals. It takes quite a bit of time to set up and create the visuals so I am really glad they are helpful.
A common technique for handling traditional sessions is to save the session information into a database that is accessible to any number of servers. This counter-acts the main con presented in this video. However! JWT is more efficient because it doesn't need to do a database lookup (and potentially another network call to connect to a shared db instance).
It might not need a full database query, but you still need to look up the private key and perform the cryptographic check on each JWT. So you're still sharing a key between servers, and need to ensure they key is up-to-date on all of them. With session cookies, if you stored user session IDs on Redis, the performance difference compared to verifying a JWT with a private key would probably be negligible. Even if you're using a SQL DB to store the session IDs, you aren't going to notice a difference until you are reaching massive numbers of users. Plus, JWTs hold user information on the browser that is much easier to compromise than a properly secured server.
This is may be my ~10th video / web page reading about JWT. I can confidently say this one explained the concept better than any one else. Finally I understand JWT and if required can explain to others.
A little bonus information: before the times of JWT devs obviously had a "workaround" for the selfishness of the servers that saved the authorization state to their own session memory. That was to make a call to a databank to check there if any other of its server buddies has already seen and authorized the user. Obviously this method had the huge disadvantage that every server unneccessary bothered the DB and was a potential security risk if that said server got hacked and gets access to the DB.
I'm having to finally tackle major security concerns after many, many years of it being my weakest subject by far. (Not totally sure why management thought putting me on this project was a good idea, but hey.) Breakdowns like this are very helpful to me, thank you.
Might be useful -- for complete newbies watching this -- to explain that base64 encoding the header and payload DOES NOT secure that data, i.e. the encoding is not an encryption, and the string can easily be decoded to reveal the original data. So don't put anything "secret" (like the user's password, or other sensitive data) in the payload. Also worth deeper explanation is what a hash is, and how it makes it possible to know that the signature sent from the user is legit. I know you demonstrated how tampering with the header or payload invalidated the signature, but I think a deeper dive into how hashing works to detect this would be beneficial.
Really good explanation! Although, regarding the last example, both servers can share the same session database but still we go back to the issue that we have to store the sessions in the database and having a lookup that takes time and it's a performance concern. Really good video. Thanks!
While I think JWT is good for particular things, I wish you had touched on its cons as well as its pros. It isn't _always_ the best solution for authorization. In fact, session authorization is considered safer, and JWT was created with the intention of having short-lived tokens that can let you authorize to a different server. It's intended as a bridge between services, but a lot of people use it for local authorization as well. And if the token's payload includes the User ID which then has to be used to query the database, you lose the benefits of JWT. It's also important to keep in mind that JWTs aren't encrypted by default, and even without the secret, a client can still _read_ the contents in plain text, they just can't modify it. All in all, there are some considerations and requirements to look at before decision which method to use for this. JWT is simple and popular, but not always best. Stay safe!
OMG, thank you. This was incredibly helpful. I've spent literally dozens of hours trying to figure out JWT and how to get it to work in my use case, but until watching your video, I was groping around in the dark lol. I still have work to do, but now it will be smooth sailing!
Most servers that use sessions also offer the ability to store an auth token to a client side cookie. This is what happens when you check “Remember me” on most sites. Then when switching servers the auth token is used to reauthorize the user and generate a new session. In other words, non-JWT already solves all the problems you say JWT solves in this video. Not saying JWT isn’t a good solution, but your video doesn’t really do a good job of explaining why it is.
Kyle, you saved my ass for future security hacks. After watching your video, I realised I was using JWT completely wrongly. You are one of the best web dev youtubers. I am your fan now!
Thank you for the video. JWT is very well explained. I have few questions regarding JWT as follows- 1. Who generates JWT token very first time? Referring to your example, is it client browser making a request to some server who generates JWT? or it is Bank who validates user against say username/password and on successful authentication then generates JWT token and send back to client? 2. How does token validator knows, if token has expired? Who performs that expiration check?
A really helpful video explaining JWT! I love that u also included advantages of using JWT compared to sessions and also included a real world usecase as example. Hope to see more videos from you! :D
Really appreciate you taking the time to explain how JWT decides the token has been tampered with. Makes a lot of sense now compared to when I heard it just happened.
It was an amazing video that clarified all the stuff I was confused with for a few weeks. Now it makes sense. Thank you so much for this wonderful, well detailed and easy to follow introduction.
I just posted an implementation to JWT authentication in Node.js based on popular demand. ruclips.net/video/mbsmsi7l3r4/видео.html
I thought you said in the video that JWT is not for authentication? :S
I really enjoy all your videos. You explain everything much better than most of the tutorials I buy on udemy. You should do your own tutorials on udemy because you're a much better teacher than most of the other people on that website.
Now m confused..you just said JWT is not for authentication and the new video title is jwt authentication..??please help..
@@grantfleming5250 same it's for Authorization I guess
Mr Kyle I'll like to ask you a question, in one of your video you titled 'JWT Authentication Tutorial - Node.js' but here you said JWT is for Authorization and not Authentication, I'm a bit confused here...
I work in the software industry and needed to understand JWT. Your tutorial is by far one of the best I've seen. Clear, concise and super easy to understand. Uber thank you!
You are very welcome! I have a video coming out on Saturday that goes over implementing JWT in Node.js so that may be something you find useful.
Man you're really a godsend, how is it humanly possible to pack so much info AND explain it all so lucidly in 15 mins?! I read so many articles but they all made the verify signature sound like magic and here you simplify it like it's no big deal. Now I finally understand why jwt is important. Thank you so so much Kyle! 😃
An articulate clear explanation of a very important security concept. Keep the videos coming Kyle.
Thank you! I felt this was one of my better videos on explaining a concept and I am really glad that you enjoyed it also.
@@WebDevSimplified I really low technology being explained in such simple way.
this is one of the underrated explanations of jwt.
as full stack engineer , I remember taking your react course 2 years ago where we were building a food application applying all the http verbs.
now , I have been working for 7 months as full stack engineer here in seattle waghinston.
if someone had told me , I will be a developer one day, I wouldn't have believed.
thanks again
Congrats on becoming a developer!
you mean CRUD?
hello brother may you please assist me in my application used springboot security problem is after a successful login it's calling the login page again not redirecting to the specified endpoint. How can I share my classes with you
Excellent explanation of JWT, I was literally able to understand JWT in 15 minutes !
Thank you! I am really glad that you enjoyed it!
why did you take 8 extra seconds after the video ended?
Kudos to you ..for the simple and clear explanation
I don't think there is any better video on the Internet explaining JWT concepts in such detailed crystal clear manner !!!
Its lovely from you, Kyle
JWT in this tutorial is all about authentication, not authorization contrary to what was described, because its use here is identifying whether the user is the same user as the one that logged in (just like with sessions). Perhaps the confusion is that JWTs are commonly used for authorization by being created to grant access to APIs so that the API server knows the client is authorized to use the API. Neverthless, JWTs can be used for authentication (as in this tutorial) such as "ID tokens" and also for authorization such as "access tokens". A clear tutorial apart from this!
Ur comment is one of those comments where I learn something
And feel I wish I come across more these kind of comments
incredible comment!
Nice, thanks man
It has been 2 years but thanks for clearing my confusion.
It was about Authorization only.
Server creates a jwt after login only. Or I can say after authentication only.
Server sends jwt back first time to client/browser after authenticated.
Then the corresponding user reqs,
Has a jwt in its header.
Now server authorizes is it a valid jwt?. (But not does not validates user mail, user password).
So the video description is correct.
If i am missing something, correct me .😮
This is seriously the best explanation of JWT I have viewed. Thank you!
Definitely
I'm gonna say what everyone else said. this might be the clearest explanations ever!
I love the way you started the video by explaining, JWT is meant for authorisation not authentication. It shows how hard you work for your content. Thank you and kudos to you..
Aaaaand he was so 100% wrong.
Thank you for the tutorials! You are making a huge difference!
You are very welcome!
Your speaking is really easy to listen to for a non native speaker like me. Thank you so much.
Another use case for JWT is the following:
- The client signs the JWT with their own private key
- The client shares its public key with you, and you keep a copy on the server
- Everytime you decode the JWT, you verify its validity with the copy of the public key that you have on the server
Any thing I get confused on, I check your page first. Your videos are really short and straight to the point with clear understanding. Thank you for putting out great content as always.
So much better than my professor's explanations. The visuals help a lot too. Thank you Kyle.
Very clear explanation. Easy to understand. Good job!!!
Your videos are some of the cleanest, most well put together, informative, and easy to follow videos on RUclips. Thank you.
I'm really in awe of how easy to understand and clear you made this topic. What an incredible explanation! This is one of your best videos :)
Was struggling to understand the concept of JWT since over 2 weeks, I'm glad I watched this tutorial. Complete concept of JWT has been cleared in my mind now. Thanks a lot for making it so clean and simple to understand.
I have been working with JWT for a while, but this explanation made me clear how things work under the hood. Thanks and keep up the good work.
I'm glad I could help!
Thanks for the great explanation on JWT. For the session cookie based solution, I think the session doesn't have to be stored in memory. Storage like Redis with TTL is a great option. So when a user tries to swtich from Bank to Retirement service, the services can both retrieve the user session from the same Redis cluster
I've never fully understood how JWT works, but after I saw this video finally everything is clear.
Thank you 🙏
You're really talented at this.
I love this kind of tutorials, simple clear and brief without losing important details.
Hope you continue providing such content.
Thank you! I promise I will never stop making videos like this. They are some of my favorite to make.
1. Explanation - awesome
2. Sound - awesome
3. Examples - concise and to the point
Wish I could give you 10 thumbs, man :)
Thank you!
Thankyou so much for this. I cant believe the difference between you explaining things vs my teachers. I finally get it now! It wasnt that difficult after all. I also love how you explain why you should use it & show us a few examples.
Where do you go to school where they teach you about JWTs?
@@knucklesamidge I’m studying to become a software engineer
@@howtobecomeapanda1547 where
@@knucklesamidge at university in The Netherlands
"Essentially we are storing the user information on the client" - that seems to be the sentence that finally got my head to wrap around this concept. Thank God for RUclips and your video, because I don't think my head could comprehend this heady subject by just reading.
Nice one Kyle, you speak so clearly and sound highly knowledgeable about JWT. Really appreciate the effort you put into your videos. Awesome. Keep up the good work.
In terms of explaining the concept, Kyle has to be one of the Very best on RUclips !
I've been working with JWTs for a while and this is the first time I've figured out how these really work. Great video.
My memory must be going, because this is like my 3rd time watching this video in the past few years. Just as helpful as ever, thanks for helping me keep my job. o7
best explanation of JWT i've come across thank you
Bro you are a genius, I learnt full stack webdevelopment from this youtube channel during corona time. Glad I found you :)
I'm really glad I was able to help
Omg your content is pure goldd!!!!! I really appreciate your good work! Thank you☺️
I am watching it 2 years after it's been published, it is still very relevant ! Thanks for video! Two thumbs up !!
A superb video for me to review this thing even I've been using it for a while. :P Btw I really love that you include graphic to illustrate the point, it is easier than just words. And I also like the servers of the bank example. :)
I am really glad you enjoyed the video and the visuals. It takes quite a bit of time to set up and create the visuals so I am really glad they are helpful.
@@WebDevSimplified Much appreciated!
this channel is really a gem. Been able to see your videos as top results of my searches also.
I would really appreciate your node and JWT Tutorial.
I just released a video on the implementation. ruclips.net/video/mbsmsi7l3r4/видео.html
Thanks this was not only super helpful in understanding jwts, but it also clarified how a session works!
Good stuff. This is not often talked about compared to other web topics.
Thanks
This is the best explanation of JWT I've seen on the internet. Thanks so much for the video!
The youtuber with perfect hair. Thank you for this video Kyle.
Heard today for the first time the phrase "JSON Web Takens" and your video has helped me inmensely to understand its application. Thanks!
A common technique for handling traditional sessions is to save the session information into a database that is accessible to any number of servers. This counter-acts the main con presented in this video. However! JWT is more efficient because it doesn't need to do a database lookup (and potentially another network call to connect to a shared db instance).
I wouldn't even use a DB for sessions. Things like Redis is way more optimized for that.
It might not need a full database query, but you still need to look up the private key and perform the cryptographic check on each JWT. So you're still sharing a key between servers, and need to ensure they key is up-to-date on all of them. With session cookies, if you stored user session IDs on Redis, the performance difference compared to verifying a JWT with a private key would probably be negligible. Even if you're using a SQL DB to store the session IDs, you aren't going to notice a difference until you are reaching massive numbers of users.
Plus, JWTs hold user information on the browser that is much easier to compromise than a properly secured server.
This is may be my ~10th video / web page reading about JWT. I can confidently say this one explained the concept better than any one else. Finally I understand JWT and if required can explain to others.
When ever I need to understand certain topic, I visit this channel.... greatWork... very helpful...
A little bonus information: before the times of JWT devs obviously had a "workaround" for the selfishness of the servers that saved the authorization state to their own session memory. That was to make a call to a databank to check there if any other of its server buddies has already seen and authorized the user. Obviously this method had the huge disadvantage that every server unneccessary bothered the DB and was a potential security risk if that said server got hacked and gets access to the DB.
Loved your explanation! Thank you so much!
I'm having to finally tackle major security concerns after many, many years of it being my weakest subject by far. (Not totally sure why management thought putting me on this project was a good idea, but hey.) Breakdowns like this are very helpful to me, thank you.
Awesome explanation. Thanks!
Dude, you're a natural teacher. Thx.
JWT with node.js, yes please. Great videos!
I've just started using JWT in my lastest Udemy course project and this video is just perfect for me to understand how it works.
Might be useful -- for complete newbies watching this -- to explain that base64 encoding the header and payload DOES NOT secure that data, i.e. the encoding is not an encryption, and the string can easily be decoded to reveal the original data. So don't put anything "secret" (like the user's password, or other sensitive data) in the payload.
Also worth deeper explanation is what a hash is, and how it makes it possible to know that the signature sent from the user is legit. I know you demonstrated how tampering with the header or payload invalidated the signature, but I think a deeper dive into how hashing works to detect this would be beneficial.
Can you please explain what's the point of encoding with base64 if it is not encryption.
Where do you put the password than?
@@СимонЦанков JWT doesn't need to store password. On registration of user, password is still stored on server
Kyle you are the BEST, I can't believe that after your explanation at 2:00 I already understood what JWT is, thanks a lot man.
Youre the best i love all your videos, super nice and clear content. learning quick. =))
Yes please on the node.js. Thanks!
Finally, I understand what JWT is all about! Thanks
Really good explanation! Although, regarding the last example, both servers can share the same session database but still we go back to the issue that we have to store the sessions in the database and having a lookup that takes time and it's a performance concern. Really good video. Thanks!
i agree
After Mosh Hamedani's tutorial, your explanation seems clear to me.. Great post. Keep it up..
While I think JWT is good for particular things, I wish you had touched on its cons as well as its pros. It isn't _always_ the best solution for authorization. In fact, session authorization is considered safer, and JWT was created with the intention of having short-lived tokens that can let you authorize to a different server. It's intended as a bridge between services, but a lot of people use it for local authorization as well. And if the token's payload includes the User ID which then has to be used to query the database, you lose the benefits of JWT.
It's also important to keep in mind that JWTs aren't encrypted by default, and even without the secret, a client can still _read_ the contents in plain text, they just can't modify it.
All in all, there are some considerations and requirements to look at before decision which method to use for this. JWT is simple and popular, but not always best. Stay safe!
OMG, thank you. This was incredibly helpful. I've spent literally dozens of hours trying to figure out JWT and how to get it to work in my use case, but until watching your video, I was groping around in the dark lol. I still have work to do, but now it will be smooth sailing!
Yeah,
When will they finally launch the
James Webb Telescope?
Mmm?
Thanks!
You are very welcome!
Most servers that use sessions also offer the ability to store an auth token to a client side cookie. This is what happens when you check “Remember me” on most sites. Then when switching servers the auth token is used to reauthorize the user and generate a new session. In other words, non-JWT already solves all the problems you say JWT solves in this video.
Not saying JWT isn’t a good solution, but your video doesn’t really do a good job of explaining why it is.
Bro, you are the one, that needs to be looked out for understanding the concepts!
Your tutorial is by far one of the best I've seen. Best precise explanation man.
I am so glad that I found your channel, Kyle. You literally make my life easier. Thank you very much!
Man, all your videos are detailed an clear explanation. Thank you for sharing your knowledge
Cleared my concept about jwt.. Thanks a lot.. I was thinking jwt was very unsecure thing to use.. You clear everything..
Thats a very clear and detail explanation about JWT. U are like the guy in the group who can explain harder thing very easily.
Thank you so much! That is exactly what I try to do on my channel.
You saved my life at work with this very clear explanation. So much easier to understand than the other material I run over the web. Thanls !!!!
I was struggling to understand the concept of JWT before. But now I feel more confident, thank you!
Man, I'm so glad I found your channel. One of the best and detailed explanations. Thank you for making it so easy to understand!
play 0AD
PURE GOLDEN Explanation, Thank you soooooooo much Kyle🙏🏼
Kyle, you saved my ass for future security hacks. After watching your video, I realised I was using JWT completely wrongly. You are one of the best web dev youtubers. I am your fan now!
You're a life saver my G ❤.
Happy Ramdan brother
Thank you for the video. JWT is very well explained.
I have few questions regarding JWT as follows-
1. Who generates JWT token very first time? Referring to your example, is it client browser making a request to some server who generates JWT? or it is Bank who validates user against say username/password and on successful authentication then generates JWT token and send back to client?
2. How does token validator knows, if token has expired? Who performs that expiration check?
This Channel provides by far the best and most clear explanations. Thank you so much for your work!
12:00 actually the session is stored where you configure it.. shared session is possible in web farm..
Yeah. Generally in real time, session is store on database and that is how session is manged between different servers.
Thanks a lot for this video. I have been struggling to understand what JWT is for months, but this video made my day.
A really helpful video explaining JWT! I love that u also included advantages of using JWT compared to sessions and also included a real world usecase as example. Hope to see more videos from you! :D
Thanks much for the explanation Kyle! Useful for someone living in Bangkok, Thailand and trying to build something!
Thanks
Thank you for the support!
Wow. This was an amazing video explaining JWT. The example you provided at the end to me was the cherry on top! Thank you so much for this!
I use and understand JWT but I could never explain it this well. Nice presentation, keep up! you've gained a subscriber.
Blown away how you explain these things. wow. simply wow.
Excellent job! You not only make a very good and clean explanation, but also add a real case where JWT is better tan sessions.
Mate seriously that was really good! You explained this so clear and easy! As we say in the ends round here in London "Respect!"
Finally today I understood what is actually a JWT, also diff between JWT and Session ID. Thank you so much.
really helpful to wrap the mind around this "complex-to-understand-at-first" concept!!!✨
nice bro, I have been using this JWT for the last 1 year without knowing its security and purpose. thanks for the video.
Crystal clear, and I also appreciate the industry example at the end. A very well thought out video, thank you
Can't thank you enough for a crisp walk through!
this man is a whole library !
Nice, learning this right now in my fullstack bootcamp and this video is a perfect compliment to it. Thumbs up.
Best Tutor i have ever found!!
Really appreciate you taking the time to explain how JWT decides the token has been tampered with. Makes a lot of sense now compared to when I heard it just happened.
Wow perfect and clear explanation for JWT. So far the best
Very well explained. This channel has been so helpful for me with learning web developement. You deserve more subscribers
It was an amazing video that clarified all the stuff I was confused with for a few weeks. Now it makes sense. Thank you so much for this wonderful, well detailed and easy to follow introduction.