Understanding JWTs: A Simple Guide for Beginners

Phil the Dev - Jul 5 '23 - - Dev Community

What is a JWT?

JWT, short for JSON Web Tokens, is a compact, URL-safe way of representing claims (information) to be transferred between two parties, the client and server. Think of it like a secret message in the form of a cryptographically signed note, which can only be understood by the intended recipient.

Structure of a JWT

A JWT has three distinct parts, each separated by a dot (.):

  • Header: It contains metadata about the token and the cryptographic algorithm used, usually HMAC SHA256 or RSA.

  • Payload: The actual data that the token carries is stored here. It's also known as the 'claims' and can include data like user details and additional metadata.

  • Signature: The signature is a cryptographically secured proof that verifies the sender and ensures the message wasn't altered during transit.

Structure of a JWT

How Does a JWT Work?

Here's the play-by-play of JWT in action:

  1. A client logs in using their credentials, sending a request to the server.
  2. The server verifies these credentials. If they're valid, the server generates a JWT and sends it back to the client.
  3. The client stores the JWT, usually in local storage, and includes it in every subsequent HTTP request's header.
  4. The server, upon receiving these requests, verifies the JWT. If it's valid, the client is authenticated and authorized.

Why Use JWT?

JWTs are universal - any programming language can generate a JWT because they're essentially JSON. Also, they facilitate maintaining session state on the client, reducing server load, which is more scalable.

Security Considerations

While JWTs are handy, they do come with some vulnerabilities:

  • Token Theft: JWTs are stored on the client-side, and hence can be stolen. Always ensure your transmission is secure, preferably via HTTPS.

  • No In-built Invalidity Mechanism: JWTs can't be invalidated individually or in a group from a user, due to their stateless nature.

  • Token Size: Storing too much data in a JWT can make it heavy, affecting network performance.

  • Algorithm Vulnerabilities: Some algorithms in the JWT header are vulnerable to attacks. Always use secure and updated algorithms, and treat your signing keys like secrets.


In conclusion, JWTs are a potent tool in web development, providing stateless, secure, and scalable communication. Remember, how effectively you wield JWTs in your application depends on your specific needs and the level of security you require.

I hope this gives you a better understanding of JWTs! Feel free to share your thoughts 😄

. . . . . .