jwt signature and validation explained

Поделиться
HTML-код
  • Опубликовано: 3 фев 2025

Комментарии • 66

  • @glenlvvy
    @glenlvvy 26 дней назад +1

    Finally someone that really explains how the validation is done - thanks, very clear

  • @EgidFertal
    @EgidFertal 2 месяца назад +1

    Thanks! It was really nice explanation :) best I found in internet so far about this in form of video :)

  • @binarasachin5104
    @binarasachin5104 8 месяцев назад +5

    One of the best explanations I found about JWT in the internet. Thank you for the video

  • @malam3958
    @malam3958 Год назад +3

    It was very helpful. thank you.

  • @sathishmanjavo
    @sathishmanjavo Год назад +3

    Nice one🎉 thanks for the video.

  • @lekanadanijo1627
    @lekanadanijo1627 2 дня назад +1

    Couldn't have done it better. Well done.

  • @SaminYasir-f3m
    @SaminYasir-f3m Год назад +2

    Excellent Video on JWT token validation! Keep the good work going!

  • @srilakshmi7040
    @srilakshmi7040 7 месяцев назад +3

    Really very good explanation. It helped me to understand what JWT is and how it works. Thanks a lot

  • @anirudh514
    @anirudh514 11 месяцев назад +3

    Very well explained!! Thanks

  • @qasimhussain7176
    @qasimhussain7176 Год назад +2

    Too good sir, really helpful, may god bless u

  • @yuvarajanbazhagan
    @yuvarajanbazhagan 8 месяцев назад +2

    Really detailed explanation about JWT.
    Thank you for this video!

  • @suyashbansod729
    @suyashbansod729 Год назад +2

    Too good explanation... Keep up the good work!!!!!

  • @user-of9qp8bj8o
    @user-of9qp8bj8o 3 месяца назад +1

    Good Explanation

  • @SoyJavero
    @SoyJavero 4 месяца назад +2

    Best explaination ever, very concise :D

  • @brunobkpzica4598
    @brunobkpzica4598 6 месяцев назад +2

    Thank you. I wish i had seen this video before a job interview i had last week.

    • @learningsoftwareskills
      @learningsoftwareskills  6 месяцев назад

      Thank you very much for ur amazing feedback 👍🙏

    • @SoyJavero
      @SoyJavero 4 месяца назад +1

      next time you'll get it right :D

  • @suraj_fusion
    @suraj_fusion 4 месяца назад +1

    One of the best explanations thank you..

  • @shanthiyarajan5233
    @shanthiyarajan5233 8 месяцев назад +2

    Perfect explanation, thanks

  • @budsyremo
    @budsyremo Месяц назад +1

    Bro even bytebytego was not able to explain it like you did , good job.

  • @ik6071
    @ik6071 2 месяца назад +1

    what a great video thank you, youre a legend

    • @learningsoftwareskills
      @learningsoftwareskills  2 месяца назад

      Hi thanks a lot for the encouraging feedback👍🙏

    • @ik6071
      @ik6071 2 месяца назад +1

      @@learningsoftwareskills I managed to implement it in a language i had no experience in. thanks for this video

  • @rryann088
    @rryann088 5 месяцев назад +1

    excellent! Thank you so much!!!

  • @amolnagrale9628
    @amolnagrale9628 4 месяца назад +1

    Very nice explanation 😃 kudos👏 first I understand deeply

  • @rahuljuneja6015
    @rahuljuneja6015 7 месяцев назад +1

    excellent and precise, thank you

  • @shraddhapaliwal4817
    @shraddhapaliwal4817 9 месяцев назад +2

    Very well explained

  • @bonammadankumar681
    @bonammadankumar681 7 месяцев назад +2

    Awesome explanation buddy

  • @KiranRaj-q2e
    @KiranRaj-q2e Год назад +2

    superb explanation

  • @DhavalAhir10
    @DhavalAhir10 23 дня назад +1

    Bro, I completely understood this video. You are such a gem! I used to think JWT is not secure because anyone can tamper with it easily, even using the official JWT website 😂.
    But today, I learned that even if an attacker wants to change the payload (e.g., the database primary key of a user from a normal user to a superuser, like id=37), they can’t. When they send an HTTP request with this tampered JWT, the server rejects it with a 'tampered JWT' error.
    This happens because the combination of Header + "." + Payload now produces a different Base64-encoded string. After applying the hash function to this new string, it generates a different hash.
    However, with this tempered JWT token the signature is as it is.
    The Signature decryption still contains the old hash, as the payload wasn't changed for the normal user.
    👌👌👌👌🗝️ The creator of JWT is truly a legend!

  • @Mayank-pk2oj
    @Mayank-pk2oj 7 месяцев назад +1

    Precise

  • @sanketsakharkar1164
    @sanketsakharkar1164 4 месяца назад +2

    Hello,
    Thank you for the detailed explanation; it is really helpful!
    I have a question: how does the receiver decrypt the message if only the server has the private key?

    • @learningsoftwareskills
      @learningsoftwareskills  4 месяца назад

      Hi, server encrypts the signature using the private key. Receiver decrypts the signature using the public key.
      Any one can decrypt a signature, but only server can encrypt a signature.
      Hope this helps, cheers 👍🙏

    • @sanketsakharkar1164
      @sanketsakharkar1164 4 месяца назад +1

      ​@@learningsoftwareskills Thank you for your input! However, I think there might be a misunderstanding. In public key cryptography, the public key is used for encryption, while the private key is used for decryption. When it comes to signatures, the server creates the signature by encrypting it with its private key, and the receiver can verify it using the server's public key. This ensures authenticity. Let me know if you'd like to discuss it further! Cheers! 👍

  • @adityathakur3748
    @adityathakur3748 11 месяцев назад +1

    Great explanation.
    I have a question does the public key should be present in the JWT, or it should be already be present on the client side for verification.

    • @learningsoftwareskills
      @learningsoftwareskills  11 месяцев назад

      Hi, public key should be present in jwt. This is required for validating the hash
      Hope this helps, cheers 👍

    • @brunobkpzica4598
      @brunobkpzica4598 6 месяцев назад +2

      @@learningsoftwareskills I think you didn't understand his question. The client should fetch the public key from the authentication server. If the public key came in the JWT, someone could tamper the JWT by replacing the public key with a new one. AWS Cognito for example provides a URL where the public key can be obtained.

    • @learningsoftwareskills
      @learningsoftwareskills  6 месяцев назад

      @@brunobkpzica4598 hi, you are right. I was wrong about the public key. The public key should be fetched from the server. Thanks 👍

    • @learningsoftwareskills
      @learningsoftwareskills  6 месяцев назад

      @@adityathakur3748 sorry the reply was wrong. The public key should be fetched from the issuing server for validating the signature.

    • @SoyJavero
      @SoyJavero 4 месяца назад

      @@brunobkpzica4598 oooh nice recommendation for aws cognito, ill use it for fetching a certificate x509, as far as i know this is more secure than public key because theres a more specific way to validate the token with a issuer and subject info and also with expiration, since public key does have these features