![JWT Security Best Practices](https://images.ctfassets.net/tldhjvq55hjd/4MvuhuAO24C8ZXSFndos5Y/002234f0ba1c56842181c288767138d1/curity-course-jwt-best-practices.png?w=1200&h=563&q=70&fm=png&bg=white)
JWT Security Best Practices
In this 1 part online course we outline some best practices for using JWTs, so that you can maintain a high level of security in your applications. These practices are based on community standards written down in RFCs as well as our own experience from working with JWTs.
- What was that JWT again?
- JWTs used as Access Tokens
- What algorithms to use
- When to validate the token
- Checking the issuer and audience
- Dealing with expiration, issued time and clock skew
- How to work with signatures
- Pairwise Pseudonymous Identifiers (PPID)
Presented by:
![Michal Trojanowski](http://images.ctfassets.net/tldhjvq55hjd/3DiiVhd6yFrp7esuAVn5L0/30bbcd5a4b7aa84b3be81368b8bf474b/image__1_.png?fm=jpg&w=256&h=256)
Michal Trojanowski
Product Marketing Engineer at Curity
Follow
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.