In this 1 part online course we outline some best practices for using these kinds of JSON-based tokens, so that you can maintain a high level of security in your applications. These practices are based on community standards written down in RFCs as well as our own experience from working with JWTs.