<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>jsonwebtokens &amp;mdash;   christova  </title>
    <link>https://christova.writeas.com/tag:jsonwebtokens</link>
    <description>&lt;b&gt;&lt;h3&gt;Tech Articles&lt;/h3&gt;&lt;/b&gt;&lt;br/&gt;&lt;b&gt;Collated from various sources. Full copyright remains with original authors.&lt;/b&gt;</description>
    <pubDate>Sat, 18 Apr 2026 18:37:36 +0000</pubDate>
    <item>
      <title>JWT (JSON Web Tokens) Explained</title>
      <link>https://christova.writeas.com/jwt-json-web-tokens-explained?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;#JWT #jsonwebtokens #authentication&#xA;&#xA;What is JWT and how it works?&#xA;&#xA;JWT (JSON Web Token) is a compact, URL-safe token used to securely transmit information between a client and a server.&#xA;&#xA;It is most commonly for authentication in modern web apps.&#xA;&#xA;A JWT has three parts separated by dots: xxxxx\[dot\]yyyyy\[dot\]zzzzz&#xA;&#xA;1\. 𝐇𝐞𝐚𝐝𝐞𝐫: Contains the algorithm used for signing the JWT (e.g., HMAC SHA256 or RSA) and the token type (JWT).&#xA;2\. 𝐏𝐚𝐲𝐥𝐨𝐚𝐝: Contains the &#34;claims&#34;, statements about an entity (typically, the user) and additional data.&#xA;3\. 𝐒𝐢𝐠𝐧𝐚𝐭𝐮𝐫𝐞: Used to verify that the sender and ensure the token hasn’t been tampered with. Generated by taking the encoded header, the encoded payload, a secret, and the algorithm specified in the header, and signing it.&#xA;&#xA;How does it work?&#xA;1\. The user logs in with credentials.&#xA;2\. The server validates credentials and generates a signed JWT.&#xA;3\. The server sends the JWT back to the client.&#xA;4\. The client stores the JWT token (typically in localStorage or cookies).&#xA;5\. For future requests, the client includes the JWT in the Authorization header.&#xA;&#xA;Key Benefits:&#xA;\- Statelessness: No need to store session information on the server, making APIs more scalable.&#xA;\- Security: Digitally signed to prevent tampering.&#xA;\- Compact: Small size allows for efficient transmission.]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/TjEVS4J5.gif" alt=""/></p>

<p><img src="https://i.snap.as/AWV40v1H.jpg" alt=""/></p>

<p><a href="https://christova.writeas.com/tag:JWT" class="hashtag"><span>#</span><span class="p-category">JWT</span></a> <a href="https://christova.writeas.com/tag:jsonwebtokens" class="hashtag"><span>#</span><span class="p-category">jsonwebtokens</span></a> <a href="https://christova.writeas.com/tag:authentication" class="hashtag"><span>#</span><span class="p-category">authentication</span></a></p>

<p><strong>What is JWT and how it works?</strong></p>

<p>JWT (JSON Web Token) is a compact, URL-safe token used to securely transmit information between a client and a server.</p>

<p>It is most commonly for authentication in modern web apps.</p>

<p>A JWT has three parts separated by dots: xxxxx[dot]yyyyy[dot]zzzzz</p>

<p>1. 𝐇𝐞𝐚𝐝𝐞𝐫: Contains the algorithm used for signing the JWT (e.g., HMAC SHA256 or RSA) and the token type (JWT).
2. 𝐏𝐚𝐲𝐥𝐨𝐚𝐝: Contains the “claims”, statements about an entity (typically, the user) and additional data.
3. 𝐒𝐢𝐠𝐧𝐚𝐭𝐮𝐫𝐞: Used to verify that the sender and ensure the token hasn’t been tampered with. Generated by taking the encoded header, the encoded payload, a secret, and the algorithm specified in the header, and signing it.</p>

<p><strong>How does it work?</strong>
1. The user logs in with credentials.
2. The server validates credentials and generates a signed JWT.
3. The server sends the JWT back to the client.
4. The client stores the JWT token (typically in localStorage or cookies).
5. For future requests, the client includes the JWT in the Authorization header.</p>

<p><strong>Key Benefits:</strong>
- Statelessness: No need to store session information on the server, making APIs more scalable.
- Security: Digitally signed to prevent tampering.
- Compact: Small size allows for efficient transmission.</p>
]]></content:encoded>
      <guid>https://christova.writeas.com/jwt-json-web-tokens-explained</guid>
      <pubDate>Thu, 26 Mar 2026 13:23:08 +0000</pubDate>
    </item>
    <item>
      <title>https://twitter.com/i/status/1790378262490943902</title>
      <link>https://christova.writeas.com/twitter-com-i-status-1790378262490943902-8fjy?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[https://twitter.com/i/status/1790378262490943902&#xA;&#xA;#JWT #JSONWebTokens #Authentication]]&gt;</description>
      <content:encoded><![CDATA[<p><blockquote class="twitter-tweet"><p lang="en" dir="ltr">What’s the difference between Session-based authentication and JWTs?<br><br>Here’s a simple breakdown for both approaches:<br><br>Session-Based Authentication<br><br>In this approach, you store the session information in a database or session store and hand over a session ID to the user.<br><br>Think of… <a href="https://t.co/Y1KG74A5c6">pic.twitter.com/Y1KG74A5c6</a></p>&mdash; Alex Xu (@alexxubyte) <a href="https://twitter.com/alexxubyte/status/1790378262490943902?ref_src=twsrc%5Etfw">May 14, 2024</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>

<p><a href="https://christova.writeas.com/tag:JWT" class="hashtag"><span>#</span><span class="p-category">JWT</span></a> <a href="https://christova.writeas.com/tag:JSONWebTokens" class="hashtag"><span>#</span><span class="p-category">JSONWebTokens</span></a> <a href="https://christova.writeas.com/tag:Authentication" class="hashtag"><span>#</span><span class="p-category">Authentication</span></a></p>
]]></content:encoded>
      <guid>https://christova.writeas.com/twitter-com-i-status-1790378262490943902-8fjy</guid>
      <pubDate>Tue, 14 May 2024 21:38:33 +0000</pubDate>
    </item>
  </channel>
</rss>