Complete JWT Authentication in SpringBoot with LLD Code | Spring Security in Microservices

preview_player
Показать описание
In this video, I dive deep into JWT Authentication with a hands-on approach using Spring Boot. We'll explore how to secure your APIs using JWT, covering everything from token generation to validation and managing common security concerns. This video is perfect for developers looking to strengthen their understanding of JWT and its implementation in a microservices architecture.

What You'll Learn:
- [0:00] Introduction to JWT Authentication
Overview of industry challenges with shallow information.
Introduction to JWT.
- [1:50] Why JWT is Needed
Explanation of authentication and authorization using tokens.
- [3:20] How JWT Works
Scenario explanation with client-server interactions.
- [5:40] Basic Structure of JWT
Components: Header, Payload, and Signature.
- [8:00] Token Generation and Validation Process
How JWT tokens are generated and validated.
- [12:00] Security Considerations with JWT
Issues with a stateful server and introduction to stateless JWT.
- [15:10] Detailed Breakdown of JWT Parts
How Header, Payload, and Signature contribute to security.
-[17:45] Hands-On JWT Code Walkthrough
Code demo for generating and validating JWT.
-[22:10] Token Expiry and Refresh Token Mechanism
Explanation of token expiration and refresh strategies.
-[24:30] Advanced Security Aspects
Mitigating risks like token tampering and unauthorized access.
-[27:10] Handling Token Invalidation
Approaches for invalidating tokens using session IDs.
-[29:30] Conclusion and Summary
Recap of key points and insights for further learning.

Resources Mentioned:
RFC 7519: JSON Web Token (JWT) standard.
📢 Don't forget to like, share, and subscribe for more in-depth tech tutorials!
Feel free to leave your questions and feedback in the comments—I’m here to help!

#SpringBoot #JWT #Authentication #Microservices #SpringSecurity #Java #BackendDevelopment #CodingDecoded
Рекомендации по теме
Комментарии
Автор

Please do not stop coming up with such videos. Hope you'll find veey good support from the community.

sfgmbkmbksfg
Автор

Hats off for your efforts to make it more clear and understandable

CAREERMAKEUP
Автор

Absolutely love your video's... Been following you for years now, starting from Daily problems on leetcode to Leetcode Contest solutions to making HLD/LLD vidoes... Absolutely love you content

Forever underdog <3

darksidekiller
Автор

Absolutely banger 🔥 videos, u r a big inspiration for a Software engineer like me. Valueable content even for a 1yr experienced like me. Keep sharing the knowledge.

ItsMeSpyder
Автор

bruh u r just awesome, I've searched everyone's vdo but no where understood, but here i get to learn a lot! TQ bhaiya

Vedic_Fit
Автор

Generally, H2 and P2 are nothing but json data coming from the client which we can call from frontend and additionally we can store secret key which need to be included in payload on aws secret manager for security. Really informative video thanks 👍🏻

harshalkardile
Автор

User can logout and login only after they know that a man in the middle attack has occurred right. Some malicious acts could be done in the mean time. Good video 👏

tanson
Автор

lets say at the time of login we generate access-token and refresh-token and store the refresh-token of a particular user to DB. the expiry time of access-token will be like 2min and refresh-token will be about 1 year. so after 2 min it will call the refresh api so it deletes the saved refresh-token and generates the new token and save it in db. for more securty we can restrict the session limit to 1 logged in user.

alphadrones
Автор

Great video!! Helped alot. Please make more videos on spring boot best practices and approach for writing production level Rest apis.

shubhamsanap
Автор

sir your videos are amazing but i think if you will create a new channel and upload vides then reach will be higher because i think its yt algorithm your channel's reach is much lower because
of the frequency of your videos may be i am wrong but this is what i think, and your content is next level!!

engineer
Автор

Great explanation Sunchit bhaiya ❤... Can you please bring some more videos on spring-security...

vatsalkudecha
Автор

Hey, Can you make a video on which database (postgres, MySql...) and other things (for frontend) we should use with spring boot in order to make a full stack project. Why and How to setup all those together.
In both case, as a web or application project. (Hope this is a nice topic for you and it would great help for me. As I am trying to make a simple project for managing my store spring as backend and I am confused about frontend and database)

aashusah
Автор

great video that explains theory very well but why do we need third party dependency like jjwt, you can use spring boot resource server for this.

jack
Автор

Hello Sanchit, could you share the link to the doc? It would be really helpful!
Many Thanks

ShaheenSultana-fy
Автор

but if we are storing session id then it will be stateful authentication not a stateless authentication correct me if i ma wrong

AaveshBagwan-bl
Автор

hey bro, please make a video on how to integrate JWT in microservices, I tried but facing some issues, and there is not proper videos on this scenario on youtube

prathameshpatil
Автор

Bhai make custom authorization server from Oauth2 in spring boot

jayneversettle
Автор

feedback - barking of dogs is distracting. fix the audio.

theSeniorSDE