Company Updates & Technology ArticlesTry Auth0 for Free Contact Us
Brute Forcing HS256 is Possible: The Importance of Using Strong Keys in Signing JWTs
Cracking a JWT signed with weak keys is possible via brute force attacks. Learn how Auth0 protects against such attacks and alternative JWT signing methods provided.
Refresh Tokens: When to Use Them and How They Interact with JWTs
Learn about refresh tokens and how they fit in the modern web. Get a working sample of how to implement it with NodeJS