Security Mindset
Handling Sensitive Data
Authentication & Authorization
Session Management
JWT
Spring Security
Practice
Assignment
Back end Track
Under construction
<aside>
🚧
This page is currently under construction. Please check back later.
</aside>
Implementation plan:
- What is JWT — a self-contained, stateless token
- Why JWT exists — solving the stateful session problem
- JWT structure: header, payload, signature
- How signing works — the server signs, then verifies (HMAC or RSA)
- Standard claims:
sub, iss, exp, iat
Custom claims: adding roles, user info
- JWT lifecycle: issuance on login, sent with each request, verification on the server
- Token expiration and why short-lived tokens matter
- Access tokens vs refresh tokens — why both exist, the refresh flow
Where to store tokens on the client (localStorage vs cookies — trade-offs)
- JWT limitations: can't be revoked easily, token size, payload is readable (base64, not encrypted)
- Session-based vs JWT-based: comparison and when to use which
- Exercise: decode a JWT on jwt.io and identify its parts
The HackYourFuture curriculum is licensed under CC BY-NC-SA 4.0

*https://hackyourfuture.net/*
Found a mistake or have a suggestion? Let us know in the feedback form.