Комментарии:
Clear explanation of the steps
Ответитьgood explanation
ОтветитьBro where will the servers get the secret key from? At least that will have to be saved in a central database storage somewhere right?
Ответитьgood short video to learn jwt
ОтветитьHello sir, consider this case, there should be a data connection between a Flipkart seller and a third-party network which wants to fetch the seller's data. Hw tokens work here please reply asap
ОтветитьHello sir, what do you mean by we use jwt for authorization, not for authentication? i think We use it in both cases .kindly Give a reply please.
ОтветитьBahut dhanyawad bhaiya! Best explanation!
ОтветитьAmazing explaination
Ответитьfirst one explain the flow very well 👌
Ответитьbadiyaa 🔥🔥🔥
Ответитьthe server decrypts the secret key and generate than the hash, than the server compares the hash to check if its the same ritght? but than the server still has to store the hashes?
ОтветитьCan you explain how token is created?
Ответить