Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It’s important to consider that JWT is a series of specs and folks can choose to use any of them to suit their needs.

In fact, it can be used to create simple tokens—even if you store them in a database in a traditional authentication sense.

But it is also helpful to be able to use OIDC, for example, with continuous delivery workflows to authenticate code for deployment. These use JWT and it works quite well I think.

Note: technically JWT is only one of the specs so it’s not exactly correct how I’m referring to it, but I think of them collectively as JWT. :)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: