Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
nine_k
on Dec 27, 2018
|
parent
|
context
|
favorite
| on:
Ask HN: What do you use for authentication and aut...
JWT in particular uses cryptography to encode a timestamp and some other parameters. This way, you can check if it's valid by just decrypting it, without hitting a DB.
Not all bearer tokens have this property.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
Not all bearer tokens have this property.