logoalt Hacker News

ijustlovemathtoday at 11:53 AM0 repliesview on HN

JWT operates on a different principle; the user's private key (API key) never leaves the user's device. Instead, the stated "role" and other JSON data are signed with the servers pubkey, then verified by the server using its master key, granting the permissions that role allows.