This post explains the concepts of JWT, JWS, and JWE, provides examples of how to implement them in Go using symmetric and asymmetric algorithms, and discusses their use cases in authorization and secure information exchange.
Table of contents
JWT, JWS, JWE and how to cook themReal-life exampleJWT and JWSReal-life example #2JWEHow to cook themFarewell1 Comment
Sort: