JSON Web Tokens (JWTs) explained with examples | System Design
HTML-код
- Опубликовано: 8 июн 2024
- In this 10-minute video, I will explain what JSON Web Tokens (JWTs) are and how they work. I will also discuss the benefits of using JWTs, and how they can be used in distributed systems and microservices architecture.
Here are some of the key points that I will cover in the video:
What is a JSON Web Token (JWT)?
How do JWTs work?
What are the benefits of using JWTs?
How can JWTs be used in distributed systems and microservices architecture?
I will also provide some examples of how JWTs can be used in real-world applications.
In a system design interview, you may be asked to design a system that uses JWTs for authentication and authorization. You may also be asked to explain the benefits of using JWTs in distributed systems and microservices architecture.
If you are able to answer these questions in a clear and concise way, you will demonstrate your knowledge of JWTs and your ability to use them in system design.
If you are interested in learning more about JWTs, I encourage you to watch this video.
System Design Interview Basics Playlist:
► • System Design Intervie...
AWS Certification:
►AWS Certified Cloud Practioner: • How to Pass AWS Certif...
►AWS Certified Solution Architect Associate: • How to Pass AWS Certif...
►AWS Certified Solution Architect Professional: • How to Pass AWS Certif...
Great explanation. 👏👏
wonderful and crystal clear examples man!!
good one, keep it up
excellent
Pls make a video on rtmp streaming architecture that handle scalability
8:56 why do you use algorithm HS256 to encode header and payload? not use base64 as usual?
The algorithm used to encode the header and payload in JSON Web Tokens (JWTs) is typically specified in the "alg" (algorithm) claim within the header of the JWT. The most common algorithms used for encoding the header and payload are various HMAC (Hash-based Message Authentication Code) algorithms, including HS256 (HMAC-SHA256).
Base64 encoding, on the other hand, is commonly used to encode the resulting signature, which is created by hashing the concatenated header and payload with a secret key using the specified algorithm. The encoded header, payload, and signature are then combined with dots (.) to form the final JWT.
How does the Api verify the token?
API can verify the token by validating the signature
my notes - can be used to authenticate and authorize (@7:23)
I could hardly understand a word of it...
thanks for the feedback, I will work on my audio, meanwhile you can also enable subtitles, they are being generated properly.
You need a or a better mic. You might think it sounds good but it don't sound professional.
I got an external mic , but I think its how I am processing my audio and its being compressed, thanks for the feedback, I will work on it
@GoatCS he sounds perfectly fine.
Nope! His sounds pretty much enough