I really enjoy all your videos. You explain everything much better than most of the tutorials I buy on udemy. You should do your own tutorials on udemy because you're a much better teacher than most of the other people on that website.
Mr Kyle I'll like to ask you a question, in one of your video you titled 'JWT Authentication Tutorial - Node.js' but here you said JWT is for Authorization and not Authentication, I'm a bit confused here...
I work in the software industry and needed to understand JWT. Your tutorial is by far one of the best I've seen. Clear, concise and super easy to understand. Uber thank you!
Man you're really a godsend, how is it humanly possible to pack so much info AND explain it all so lucidly in 15 mins?! I read so many articles but they all made the verify signature sound like magic and here you simplify it like it's no big deal. Now I finally understand why jwt is important. Thank you so so much Kyle! 😃
JWT in this tutorial is all about authentication, not authorization contrary to what was described, because its use here is identifying whether the user is the same user as the one that logged in (just like with sessions). Perhaps the confusion is that JWTs are commonly used for authorization by being created to grant access to APIs so that the API server knows the client is authorized to use the API. Neverthless, JWTs can be used for authentication (as in this tutorial) such as "ID tokens" and also for authorization such as "access tokens". A clear tutorial apart from this!
It was about Authorization only. Server creates a jwt after login only. Or I can say after authentication only. Server sends jwt back first time to client/browser after authenticated. Then the corresponding user reqs, Has a jwt in its header. Now server authorizes is it a valid jwt?. (But not does not validates user mail, user password). So the video description is correct. If i am missing something, correct me .😮
this is one of the underrated explanations of jwt. as full stack engineer , I remember taking your react course 2 years ago where we were building a food application applying all the http verbs. now , I have been working for 7 months as full stack engineer here in seattle waghinston. if someone had told me , I will be a developer one day, I wouldn't have believed. thanks again
hello brother may you please assist me in my application used springboot security problem is after a successful login it's calling the login page again not redirecting to the specified endpoint. How can I share my classes with you
Another use case for JWT is the following: - The client signs the JWT with their own private key - The client shares its public key with you, and you keep a copy on the server - Everytime you decode the JWT, you verify its validity with the copy of the public key that you have on the server
I love the way you started the video by explaining, JWT is meant for authorisation not authentication. It shows how hard you work for your content. Thank you and kudos to you..
"Essentially we are storing the user information on the client" - that seems to be the sentence that finally got my head to wrap around this concept. Thank God for UA-cam and your video, because I don't think my head could comprehend this heady subject by just reading.
Was struggling to understand the concept of JWT since over 2 weeks, I'm glad I watched this tutorial. Complete concept of JWT has been cleared in my mind now. Thanks a lot for making it so clean and simple to understand.
Thanks for the great explanation on JWT. For the session cookie based solution, I think the session doesn't have to be stored in memory. Storage like Redis with TTL is a great option. So when a user tries to swtich from Bank to Retirement service, the services can both retrieve the user session from the same Redis cluster
Any thing I get confused on, I check your page first. Your videos are really short and straight to the point with clear understanding. Thank you for putting out great content as always.
Thankyou so much for this. I cant believe the difference between you explaining things vs my teachers. I finally get it now! It wasnt that difficult after all. I also love how you explain why you should use it & show us a few examples.
This is may be my ~10th video / web page reading about JWT. I can confidently say this one explained the concept better than any one else. Finally I understand JWT and if required can explain to others.
You're really talented at this. I love this kind of tutorials, simple clear and brief without losing important details. Hope you continue providing such content.
A little bonus information: before the times of JWT devs obviously had a "workaround" for the selfishness of the servers that saved the authorization state to their own session memory. That was to make a call to a databank to check there if any other of its server buddies has already seen and authorized the user. Obviously this method had the huge disadvantage that every server unneccessary bothered the DB and was a potential security risk if that said server got hacked and gets access to the DB.
Nice one Kyle, you speak so clearly and sound highly knowledgeable about JWT. Really appreciate the effort you put into your videos. Awesome. Keep up the good work.
A common technique for handling traditional sessions is to save the session information into a database that is accessible to any number of servers. This counter-acts the main con presented in this video. However! JWT is more efficient because it doesn't need to do a database lookup (and potentially another network call to connect to a shared db instance).
It might not need a full database query, but you still need to look up the private key and perform the cryptographic check on each JWT. So you're still sharing a key between servers, and need to ensure they key is up-to-date on all of them. With session cookies, if you stored user session IDs on Redis, the performance difference compared to verifying a JWT with a private key would probably be negligible. Even if you're using a SQL DB to store the session IDs, you aren't going to notice a difference until you are reaching massive numbers of users. Plus, JWTs hold user information on the browser that is much easier to compromise than a properly secured server.
I'm having to finally tackle major security concerns after many, many years of it being my weakest subject by far. (Not totally sure why management thought putting me on this project was a good idea, but hey.) Breakdowns like this are very helpful to me, thank you.
Might be useful -- for complete newbies watching this -- to explain that base64 encoding the header and payload DOES NOT secure that data, i.e. the encoding is not an encryption, and the string can easily be decoded to reveal the original data. So don't put anything "secret" (like the user's password, or other sensitive data) in the payload. Also worth deeper explanation is what a hash is, and how it makes it possible to know that the signature sent from the user is legit. I know you demonstrated how tampering with the header or payload invalidated the signature, but I think a deeper dive into how hashing works to detect this would be beneficial.
A superb video for me to review this thing even I've been using it for a while. :P Btw I really love that you include graphic to illustrate the point, it is easier than just words. And I also like the servers of the bank example. :)
I am really glad you enjoyed the video and the visuals. It takes quite a bit of time to set up and create the visuals so I am really glad they are helpful.
My memory must be going, because this is like my 3rd time watching this video in the past few years. Just as helpful as ever, thanks for helping me keep my job. o7
While I think JWT is good for particular things, I wish you had touched on its cons as well as its pros. It isn't _always_ the best solution for authorization. In fact, session authorization is considered safer, and JWT was created with the intention of having short-lived tokens that can let you authorize to a different server. It's intended as a bridge between services, but a lot of people use it for local authorization as well. And if the token's payload includes the User ID which then has to be used to query the database, you lose the benefits of JWT. It's also important to keep in mind that JWTs aren't encrypted by default, and even without the secret, a client can still _read_ the contents in plain text, they just can't modify it. All in all, there are some considerations and requirements to look at before decision which method to use for this. JWT is simple and popular, but not always best. Stay safe!
Really good explanation! Although, regarding the last example, both servers can share the same session database but still we go back to the issue that we have to store the sessions in the database and having a lookup that takes time and it's a performance concern. Really good video. Thanks!
OMG, thank you. This was incredibly helpful. I've spent literally dozens of hours trying to figure out JWT and how to get it to work in my use case, but until watching your video, I was groping around in the dark lol. I still have work to do, but now it will be smooth sailing!
Most servers that use sessions also offer the ability to store an auth token to a client side cookie. This is what happens when you check “Remember me” on most sites. Then when switching servers the auth token is used to reauthorize the user and generate a new session. In other words, non-JWT already solves all the problems you say JWT solves in this video. Not saying JWT isn’t a good solution, but your video doesn’t really do a good job of explaining why it is.
I recommended my channel viewers to check out this video to understand JWTs before implementing them in a Spring Boot application. Couldn't have explained them better myself!
Really appreciate you taking the time to explain how JWT decides the token has been tampered with. Makes a lot of sense now compared to when I heard it just happened.
I really loved your video it really did help me understand JWT better. But I have a critique. Authorization refers to the idea of “restricting what you have access to.” Authentication refers to the idea of “you are who you say you are”. Given that I would disagree and say JWT is a form of authentication not a form of authorization
Any tutorial I watch, I have to increase the speed in UA-cam but with your content, I had to slow it down at 0.75 speed. You speak so fast 😀 I must say, you provide better content and very informative videos.
Thank you for the video. JWT is very well explained. I have few questions regarding JWT as follows- 1. Who generates JWT token very first time? Referring to your example, is it client browser making a request to some server who generates JWT? or it is Bank who validates user against say username/password and on successful authentication then generates JWT token and send back to client? 2. How does token validator knows, if token has expired? Who performs that expiration check?
I just posted an implementation to JWT authentication in Node.js based on popular demand. ua-cam.com/video/mbsmsi7l3r4/v-deo.html
I thought you said in the video that JWT is not for authentication? :S
I really enjoy all your videos. You explain everything much better than most of the tutorials I buy on udemy. You should do your own tutorials on udemy because you're a much better teacher than most of the other people on that website.
Now m confused..you just said JWT is not for authentication and the new video title is jwt authentication..??please help..
@@grantfleming5250 same it's for Authorization I guess
Mr Kyle I'll like to ask you a question, in one of your video you titled 'JWT Authentication Tutorial - Node.js' but here you said JWT is for Authorization and not Authentication, I'm a bit confused here...
I work in the software industry and needed to understand JWT. Your tutorial is by far one of the best I've seen. Clear, concise and super easy to understand. Uber thank you!
You are very welcome! I have a video coming out on Saturday that goes over implementing JWT in Node.js so that may be something you find useful.
Man you're really a godsend, how is it humanly possible to pack so much info AND explain it all so lucidly in 15 mins?! I read so many articles but they all made the verify signature sound like magic and here you simplify it like it's no big deal. Now I finally understand why jwt is important. Thank you so so much Kyle! 😃
JWT in this tutorial is all about authentication, not authorization contrary to what was described, because its use here is identifying whether the user is the same user as the one that logged in (just like with sessions). Perhaps the confusion is that JWTs are commonly used for authorization by being created to grant access to APIs so that the API server knows the client is authorized to use the API. Neverthless, JWTs can be used for authentication (as in this tutorial) such as "ID tokens" and also for authorization such as "access tokens". A clear tutorial apart from this!
Ur comment is one of those comments where I learn something
And feel I wish I come across more these kind of comments
incredible comment!
Nice, thanks man
It has been 2 years but thanks for clearing my confusion.
It was about Authorization only.
Server creates a jwt after login only. Or I can say after authentication only.
Server sends jwt back first time to client/browser after authenticated.
Then the corresponding user reqs,
Has a jwt in its header.
Now server authorizes is it a valid jwt?. (But not does not validates user mail, user password).
So the video description is correct.
If i am missing something, correct me .😮
this is one of the underrated explanations of jwt.
as full stack engineer , I remember taking your react course 2 years ago where we were building a food application applying all the http verbs.
now , I have been working for 7 months as full stack engineer here in seattle waghinston.
if someone had told me , I will be a developer one day, I wouldn't have believed.
thanks again
Congrats on becoming a developer!
you mean CRUD?
hello brother may you please assist me in my application used springboot security problem is after a successful login it's calling the login page again not redirecting to the specified endpoint. How can I share my classes with you
An articulate clear explanation of a very important security concept. Keep the videos coming Kyle.
Thank you! I felt this was one of my better videos on explaining a concept and I am really glad that you enjoyed it also.
@@WebDevSimplified I really low technology being explained in such simple way.
Your speaking is really easy to listen to for a non native speaker like me. Thank you so much.
Another use case for JWT is the following:
- The client signs the JWT with their own private key
- The client shares its public key with you, and you keep a copy on the server
- Everytime you decode the JWT, you verify its validity with the copy of the public key that you have on the server
Very clear explanation. Easy to understand. Good job!!!
Excellent explanation of JWT, I was literally able to understand JWT in 15 minutes !
Thank you! I am really glad that you enjoyed it!
why did you take 8 extra seconds after the video ended?
Kudos to you ..for the simple and clear explanation
I've never fully understood how JWT works, but after I saw this video finally everything is clear.
Thank you 🙏
I don't think there is any better video on the Internet explaining JWT concepts in such detailed crystal clear manner !!!
Its lovely from you, Kyle
I love the way you started the video by explaining, JWT is meant for authorisation not authentication. It shows how hard you work for your content. Thank you and kudos to you..
Aaaaand he was so 100% wrong.
I'm gonna say what everyone else said. this might be the clearest explanations ever!
Loved your explanation! Thank you so much!
This is seriously the best explanation of JWT I have viewed. Thank you!
Definitely
"Essentially we are storing the user information on the client" - that seems to be the sentence that finally got my head to wrap around this concept. Thank God for UA-cam and your video, because I don't think my head could comprehend this heady subject by just reading.
Was struggling to understand the concept of JWT since over 2 weeks, I'm glad I watched this tutorial. Complete concept of JWT has been cleared in my mind now. Thanks a lot for making it so clean and simple to understand.
I have been working with JWT for a while, but this explanation made me clear how things work under the hood. Thanks and keep up the good work.
I'm glad I could help!
Thank you for the tutorials! You are making a huge difference!
You are very welcome!
When ever I need to understand certain topic, I visit this channel.... greatWork... very helpful...
Thanks for the great explanation on JWT. For the session cookie based solution, I think the session doesn't have to be stored in memory. Storage like Redis with TTL is a great option. So when a user tries to swtich from Bank to Retirement service, the services can both retrieve the user session from the same Redis cluster
Any thing I get confused on, I check your page first. Your videos are really short and straight to the point with clear understanding. Thank you for putting out great content as always.
Thankyou so much for this. I cant believe the difference between you explaining things vs my teachers. I finally get it now! It wasnt that difficult after all. I also love how you explain why you should use it & show us a few examples.
Where do you go to school where they teach you about JWTs?
@@knucklesamidge I’m studying to become a software engineer
@@howtobecomeapanda1547 where
@@knucklesamidge at university in The Netherlands
I've just started using JWT in my lastest Udemy course project and this video is just perfect for me to understand how it works.
So much better than my professor's explanations. The visuals help a lot too. Thank you Kyle.
I am watching it 2 years after it's been published, it is still very relevant ! Thanks for video! Two thumbs up !!
Your videos are some of the cleanest, most well put together, informative, and easy to follow videos on UA-cam. Thank you.
This is may be my ~10th video / web page reading about JWT. I can confidently say this one explained the concept better than any one else. Finally I understand JWT and if required can explain to others.
I would really appreciate your node and JWT Tutorial.
I just released a video on the implementation. ua-cam.com/video/mbsmsi7l3r4/v-deo.html
Cleared my concept about jwt.. Thanks a lot.. I was thinking jwt was very unsecure thing to use.. You clear everything..
You're really talented at this.
I love this kind of tutorials, simple clear and brief without losing important details.
Hope you continue providing such content.
Thank you! I promise I will never stop making videos like this. They are some of my favorite to make.
Finally, I understand what JWT is all about! Thanks
I've been working with JWTs for a while and this is the first time I've figured out how these really work. Great video.
I'm really in awe of how easy to understand and clear you made this topic. What an incredible explanation! This is one of your best videos :)
A little bonus information: before the times of JWT devs obviously had a "workaround" for the selfishness of the servers that saved the authorization state to their own session memory. That was to make a call to a databank to check there if any other of its server buddies has already seen and authorized the user. Obviously this method had the huge disadvantage that every server unneccessary bothered the DB and was a potential security risk if that said server got hacked and gets access to the DB.
Thanks this was not only super helpful in understanding jwts, but it also clarified how a session works!
Nice one Kyle, you speak so clearly and sound highly knowledgeable about JWT. Really appreciate the effort you put into your videos. Awesome. Keep up the good work.
Bro you are a genius, I learnt full stack webdevelopment from this youtube channel during corona time. Glad I found you :)
I'm really glad I was able to help
A common technique for handling traditional sessions is to save the session information into a database that is accessible to any number of servers. This counter-acts the main con presented in this video. However! JWT is more efficient because it doesn't need to do a database lookup (and potentially another network call to connect to a shared db instance).
I wouldn't even use a DB for sessions. Things like Redis is way more optimized for that.
It might not need a full database query, but you still need to look up the private key and perform the cryptographic check on each JWT. So you're still sharing a key between servers, and need to ensure they key is up-to-date on all of them. With session cookies, if you stored user session IDs on Redis, the performance difference compared to verifying a JWT with a private key would probably be negligible. Even if you're using a SQL DB to store the session IDs, you aren't going to notice a difference until you are reaching massive numbers of users.
Plus, JWTs hold user information on the browser that is much easier to compromise than a properly secured server.
Heard today for the first time the phrase "JSON Web Takens" and your video has helped me inmensely to understand its application. Thanks!
I'm having to finally tackle major security concerns after many, many years of it being my weakest subject by far. (Not totally sure why management thought putting me on this project was a good idea, but hey.) Breakdowns like this are very helpful to me, thank you.
Awesome explanation. Thanks!
Dude, you're a natural teacher. Thx.
best explanation of JWT i've come across thank you
Blown away how you explain these things. wow. simply wow.
Might be useful -- for complete newbies watching this -- to explain that base64 encoding the header and payload DOES NOT secure that data, i.e. the encoding is not an encryption, and the string can easily be decoded to reveal the original data. So don't put anything "secret" (like the user's password, or other sensitive data) in the payload.
Also worth deeper explanation is what a hash is, and how it makes it possible to know that the signature sent from the user is legit. I know you demonstrated how tampering with the header or payload invalidated the signature, but I think a deeper dive into how hashing works to detect this would be beneficial.
Can you please explain what's the point of encoding with base64 if it is not encryption.
Where do you put the password than?
@@СимонЦанков JWT doesn't need to store password. On registration of user, password is still stored on server
In terms of explaining the concept, Kyle has to be one of the Very best on UA-cam !
Omg your content is pure goldd!!!!! I really appreciate your good work! Thank you☺️
came here late.
liked ur vid for telling in the beginning
"authorization and authentication" are different.🙂
Good stuff. This is not often talked about compared to other web topics.
Thanks
Thank you Web Dev Simplified 🙏
A superb video for me to review this thing even I've been using it for a while. :P Btw I really love that you include graphic to illustrate the point, it is easier than just words. And I also like the servers of the bank example. :)
I am really glad you enjoyed the video and the visuals. It takes quite a bit of time to set up and create the visuals so I am really glad they are helpful.
@@WebDevSimplified Much appreciated!
Thanks much for the explanation Kyle! Useful for someone living in Bangkok, Thailand and trying to build something!
JWT with node.js, yes please. Great videos!
I was struggling to understand the concept of JWT before. But now I feel more confident, thank you!
The youtuber with perfect hair. Thank you for this video Kyle.
My memory must be going, because this is like my 3rd time watching this video in the past few years. Just as helpful as ever, thanks for helping me keep my job. o7
Yes please on the node.js. Thanks!
This is the best explanation of JWT I've seen on the internet. Thanks so much for the video!
While I think JWT is good for particular things, I wish you had touched on its cons as well as its pros. It isn't _always_ the best solution for authorization. In fact, session authorization is considered safer, and JWT was created with the intention of having short-lived tokens that can let you authorize to a different server. It's intended as a bridge between services, but a lot of people use it for local authorization as well. And if the token's payload includes the User ID which then has to be used to query the database, you lose the benefits of JWT.
It's also important to keep in mind that JWTs aren't encrypted by default, and even without the secret, a client can still _read_ the contents in plain text, they just can't modify it.
All in all, there are some considerations and requirements to look at before decision which method to use for this. JWT is simple and popular, but not always best. Stay safe!
1. Explanation - awesome
2. Sound - awesome
3. Examples - concise and to the point
Wish I could give you 10 thumbs, man :)
Thank you!
Really good explanation! Although, regarding the last example, both servers can share the same session database but still we go back to the issue that we have to store the sessions in the database and having a lookup that takes time and it's a performance concern. Really good video. Thanks!
i agree
Man, all your videos are detailed an clear explanation. Thank you for sharing your knowledge
Youre the best i love all your videos, super nice and clear content. learning quick. =))
Bro, you are the one, that needs to be looked out for understanding the concepts!
Yeah,
When will they finally launch the
James Webb Telescope?
Mmm?
OMG, thank you. This was incredibly helpful. I've spent literally dozens of hours trying to figure out JWT and how to get it to work in my use case, but until watching your video, I was groping around in the dark lol. I still have work to do, but now it will be smooth sailing!
Most servers that use sessions also offer the ability to store an auth token to a client side cookie. This is what happens when you check “Remember me” on most sites. Then when switching servers the auth token is used to reauthorize the user and generate a new session. In other words, non-JWT already solves all the problems you say JWT solves in this video.
Not saying JWT isn’t a good solution, but your video doesn’t really do a good job of explaining why it is.
Kyle you are the BEST, I can't believe that after your explanation at 2:00 I already understood what JWT is, thanks a lot man.
this channel is really a gem. Been able to see your videos as top results of my searches also.
Finally today I understood what is actually a JWT, also diff between JWT and Session ID. Thank you so much.
Your tutorial is by far one of the best I've seen. Best precise explanation man.
Can't thank you enough for a crisp walk through!
I recommended my channel viewers to check out this video to understand JWTs before implementing them in a Spring Boot application.
Couldn't have explained them better myself!
really helpful to wrap the mind around this "complex-to-understand-at-first" concept!!!✨
You saved my life at work with this very clear explanation. So much easier to understand than the other material I run over the web. Thanls !!!!
Thats a very clear and detail explanation about JWT. U are like the guy in the group who can explain harder thing very easily.
Thank you so much! That is exactly what I try to do on my channel.
Thank you very much for those graphs! Finally the concept clicked for me.
nice bro, I have been using this JWT for the last 1 year without knowing its security and purpose. thanks for the video.
I love ur voice .. it calms me down man ... u r meditation music for programmers
this man is a whole library !
After Mosh Hamedani's tutorial, your explanation seems clear to me.. Great post. Keep it up..
Really appreciate you taking the time to explain how JWT decides the token has been tampered with. Makes a lot of sense now compared to when I heard it just happened.
Thanks a lot for this video. I have been struggling to understand what JWT is for months, but this video made my day.
Nice, learning this right now in my fullstack bootcamp and this video is a perfect compliment to it. Thumbs up.
PURE GOLDEN Explanation, Thank you soooooooo much Kyle🙏🏼
You're a life saver my G ❤.
Happy Ramdan brother
Far more understandable than any others among the ones who claims the most
You really explain in a simplified manner.....Thanks for the videos.
Mate seriously that was really good! You explained this so clear and easy! As we say in the ends round here in London "Respect!"
Crystal clear, and I also appreciate the industry example at the end. A very well thought out video, thank you
I must say that i didn't learn JWT only from this video but enjoyed your explanation too.
literally this video is all you need, to know about JWT. Cheers
finally I understand how jwt works! thank you Kyle!
Thank you Kyle! Those were really clear explanations.
I really loved your video it really did help me understand JWT better. But I have a critique. Authorization refers to the idea of “restricting what you have access to.” Authentication refers to the idea of “you are who you say you are”. Given that I would disagree and say JWT is a form of authentication not a form of authorization
Any tutorial I watch, I have to increase the speed in UA-cam but with your content, I had to slow it down at 0.75 speed. You speak so fast 😀
I must say, you provide better content and very informative videos.
Thank you for the video. JWT is very well explained.
I have few questions regarding JWT as follows-
1. Who generates JWT token very first time? Referring to your example, is it client browser making a request to some server who generates JWT? or it is Bank who validates user against say username/password and on successful authentication then generates JWT token and send back to client?
2. How does token validator knows, if token has expired? Who performs that expiration check?
This Channel provides by far the best and most clear explanations. Thank you so much for your work!
very good explanation with realistic examples. it helps that you repeated the basics a few times, helps it sink in.