Explore chapters and articles related to this topic
Dependable workflow management system for smart farms
Published in Connection Science, 2022
Catalin Negru, George Musat, Madalin Colezea, Constantin Anghel, Alexandru Dumitrascu, Florin Pop, Carmen De Maio, Aniello Castiglione
The implementation details of the authentication and the data flow of it will be presented in a following chapter. Although any kind of token cam be used for stateless authentication, our implementation is based on the JSON Web Token technology (JWT) which become a standard de facto for doing this. JWT is a compact, URL-safe means of representing claims to be transferred between two parties (Jones et al., 2015). The structure of a JWT can be seen in Figure 5. It is composed of three sections separated by a dot. The first section is the header and it is a JSON which have two claims, one for describing the algorithm used and other for specifying the type of JWT. The second section is the payload, which contains a JSON with the actual data. The third sections are the signature. All three sections are base64 encoded.