signing key • Always verify the signature before trusting information from the token • Don't accept tokens with { "alg": "none" } in the header unless you have a very good reason
signing key • Always verify the signature before trusting information from the token • Don't accept tokens with { "alg": "none" } in the header unless you have a very good reason
signing key • Always verify the signature before trusting information from the token • Don't accept tokens with { "alg": "none" } in the header unless you have a very good reason • Make sure your library has no security holes
signing key • Always verify the signature before trusting information from the token • Don't accept tokens with { "alg": "none" } in the header unless you have a very good reason • Make sure your library has no security holes
encrypted If you need encryption, check out JWE • Use exp claim to let the token expire, add jti claim if you're worried about replay attacks Some things to keep in mind…
encrypted If you need encryption, check out JWE • Use exp claim to let the token expire, add jti claim if you're worried about replay attacks • The token needs to be stored client side, so make sure that's secure too! Some things to keep in mind…