
The tokens can be signed by one party's private key (usually the server's) so that any party can subsequently verify whether or not the token is legitimate. The client could then use that token to prove that it is logged in as admin. The tokens are signed either using a private secret or a public/private key.įor example, a server could generate a token that has the claim "logged in as administrator" and provide that to a client. JSON Web Token ( JWT, pronounced / dʒ ɒ t/, same as the word "jot" ) is a proposed Internet standard for creating data with optional signature and/or optional encryption whose payload holds JSON that asserts some number of claims.
