Answer the question
In order to leave comments, you need to log in
Authorization principle using JWT?
Good day. I did not really understand the principle of authorization using JWT.
So I sent a request to the server for authorization, it checks all the data, in response it issues a JWT token. Question:
1) Where is the best place to store it?
2) There is also such an option that the attacker will simply take this token, send it to the server and impersonate another user. How to deal with this option?
3) Let's say we figured out the storage. Now I'm sending a request to the server to get some information and I want to identify the user. On the server, one JWT comes from it. How can I do it?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question