jwt signature and validation explained

Поделиться
HTML-код
  • Опубликовано: 25 окт 2024

Комментарии • 53

  • @malam3958
    @malam3958 9 месяцев назад +3

    It was very helpful. thank you.

  • @sathishmanjavo
    @sathishmanjavo Год назад +3

    Nice one🎉 thanks for the video.

  • @binarasachin5104
    @binarasachin5104 4 месяца назад +5

    One of the best explanations I found about JWT in the internet. Thank you for the video

  • @suraj_fusion
    @suraj_fusion Месяц назад +1

    One of the best explanations thank you..

  • @rryann088
    @rryann088 2 месяца назад +1

    excellent! Thank you so much!!!

  • @SoyJavero
    @SoyJavero Месяц назад +2

    Best explaination ever, very concise :D

  • @amolnagrale9628
    @amolnagrale9628 Месяц назад +1

    Very nice explanation 😃 kudos👏 first I understand deeply

  • @user-of9qp8bj8o
    @user-of9qp8bj8o 14 дней назад +1

    Good Explanation

  • @srilakshmi7040
    @srilakshmi7040 4 месяца назад +3

    Really very good explanation. It helped me to understand what JWT is and how it works. Thanks a lot

  • @anirudh514
    @anirudh514 8 месяцев назад +3

    Very well explained!! Thanks

  • @suyashbansod729
    @suyashbansod729 10 месяцев назад +2

    Too good explanation... Keep up the good work!!!!!

  • @SaminYasir-f3m
    @SaminYasir-f3m Год назад +2

    Excellent Video on JWT token validation! Keep the good work going!

  • @yuvarajanbazhagan
    @yuvarajanbazhagan 4 месяца назад +2

    Really detailed explanation about JWT.
    Thank you for this video!

  • @brunobkpzica4598
    @brunobkpzica4598 3 месяца назад +2

    Thank you. I wish i had seen this video before a job interview i had last week.

    • @learningsoftwareskills
      @learningsoftwareskills  3 месяца назад

      Thank you very much for ur amazing feedback 👍🙏

    • @SoyJavero
      @SoyJavero Месяц назад +1

      next time you'll get it right :D

  • @qasimhussain7176
    @qasimhussain7176 9 месяцев назад +2

    Too good sir, really helpful, may god bless u

  • @rahuljuneja6015
    @rahuljuneja6015 4 месяца назад +1

    excellent and precise, thank you

  • @shanthiyarajan5233
    @shanthiyarajan5233 5 месяцев назад +2

    Perfect explanation, thanks

  • @bonammadankumar681
    @bonammadankumar681 4 месяца назад +2

    Awesome explanation buddy

  • @KiranRaj-q2e
    @KiranRaj-q2e 9 месяцев назад +2

    superb explanation

  • @shraddhapaliwal4817
    @shraddhapaliwal4817 6 месяцев назад +2

    Very well explained

  • @sanketsakharkar1164
    @sanketsakharkar1164 27 дней назад +2

    Hello,
    Thank you for the detailed explanation; it is really helpful!
    I have a question: how does the receiver decrypt the message if only the server has the private key?

    • @learningsoftwareskills
      @learningsoftwareskills  26 дней назад

      Hi, server encrypts the signature using the private key. Receiver decrypts the signature using the public key.
      Any one can decrypt a signature, but only server can encrypt a signature.
      Hope this helps, cheers 👍🙏

    • @sanketsakharkar1164
      @sanketsakharkar1164 25 дней назад +1

      ​@@learningsoftwareskills Thank you for your input! However, I think there might be a misunderstanding. In public key cryptography, the public key is used for encryption, while the private key is used for decryption. When it comes to signatures, the server creates the signature by encrypting it with its private key, and the receiver can verify it using the server's public key. This ensures authenticity. Let me know if you'd like to discuss it further! Cheers! 👍

  • @Mayank-pk2oj
    @Mayank-pk2oj 3 месяца назад +1

    Precise

  • @adityathakur3748
    @adityathakur3748 8 месяцев назад +1

    Great explanation.
    I have a question does the public key should be present in the JWT, or it should be already be present on the client side for verification.

    • @learningsoftwareskills
      @learningsoftwareskills  8 месяцев назад

      Hi, public key should be present in jwt. This is required for validating the hash
      Hope this helps, cheers 👍

    • @brunobkpzica4598
      @brunobkpzica4598 3 месяца назад +2

      @@learningsoftwareskills I think you didn't understand his question. The client should fetch the public key from the authentication server. If the public key came in the JWT, someone could tamper the JWT by replacing the public key with a new one. AWS Cognito for example provides a URL where the public key can be obtained.

    • @learningsoftwareskills
      @learningsoftwareskills  3 месяца назад

      @@brunobkpzica4598 hi, you are right. I was wrong about the public key. The public key should be fetched from the server. Thanks 👍

    • @learningsoftwareskills
      @learningsoftwareskills  3 месяца назад

      @@adityathakur3748 sorry the reply was wrong. The public key should be fetched from the issuing server for validating the signature.

    • @SoyJavero
      @SoyJavero Месяц назад

      @@brunobkpzica4598 oooh nice recommendation for aws cognito, ill use it for fetching a certificate x509, as far as i know this is more secure than public key because theres a more specific way to validate the token with a issuer and subject info and also with expiration, since public key does have these features