In jwt jwt , they write that user authentication can be implemented even without storing the token in the database. What then is the sequence of actions? Since I have only one algorithm in my head: for example, the user sends a post request in json format for a specific url . And the method of comparison in the database understand whether to give access or not. But this is not true. It is correct to have him access without a password and login only by the hash key. Just for this and come up with jwt . I downloaded the lcobucci/jwt . And with the generated key. And then what? What should the user transfer to me in order to form his separate key? And then let it through him? And to make it safe.
|
urlfor each user. How can I understand who should be given access and, accordingly, the token, and who should not be given? - doox911jwt. Then I do not understand how to understand that this is the right keys? - doox911 7:14 pm