Answer the question
In order to leave comments, you need to log in
Is JWT authorization implemented securely?
Good afternoon. Straight to the point.
Implemented authorization using jwt.
The user logs in to the site, the generated token is returned to him through the api.
The token is written to localStorage as key:value
On subsequent actions of the user, the token is checked, if everything is OK, then the user receives the requested data.
Is everything implemented correctly and is it safe?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question