Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? Or are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.
- Added Annex A: JWT Best Current Practices (based on draft from IETF OAuth Working Group)
- Changed deprecated Pandoc command line parameter.
- Fixed typos.