Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Another Pro is that they can be read client-side, so the server and the client have an agreement on who the user is and what their attributes are (if they are defined in the JWT payload).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: