Json Web Token (JWT)

JSON Web Token (JWT) is an open standard and are just one piece of the puzzle in ensuring trust and security in our application. The reason why JWT are used is to prove that the sent data was actually created by an authentic source. (are not used to secure data)

A JSON Web Token consists of three parts: Header, Payload and Signature.

The header component of the JWT contains information about how the JWT signature should be computed. The header is a JSON object in the following format:
“typ”: “JWT”,
“alg”: “HS256”

In this JSON, the value of the “typ” key specifies that the object is a JWT, and the value of the “alg” key specifies which hashing algorithm is being used to create the JWT signature component.

The payload component of the JWT is the data that‘s stored inside the JWT (this data is also referred to as the “claims” of the JWT). We can put as many claims as you like in Payload. There are several different standard claims for the JWT payload, such as “iss” the issuer, “sub” the subject, and “exp” the expiration time. These fields can be useful when creating JWT, but they are optional.

Code Name Description
iss Issuer Identifies principal that issued the JWT.
sub Subject Identifies the subject of the JWT.
aud Audience Identifies the recipients that the JWT is intended for. Each principal intended to process the JWT must identify itself with a value in the audience claim. If the principal processing the claim does not identify itself with a value in the aud claim when this claim is present, then the JWT must be rejected
exp Expiration time Identifies the expiration time on or after which the JWT must not be accepted for processing. The value should be in NumericDate format.
nbf Not before Identifies the time on which the JWT will start to be accepted for processing.
iat Issued at Identifies the time at which the JWT was issued.
jti JWT ID Case sensitive unique identifier of the token even among different issuers.
  • The signature is computed using the following pseudo code:

// signature algorithm

data = base64urlEncode( header ) + “.” + base64urlEncode( payload )

hashedData = hash( data, secret )

signature = base64urlEncode( hashedData )

The algorithm then joins the resulting encoded strings (header and payload) together with a period (.) in between them. In our pseudo code, this joined string is assigned to data. The data string is hashed with the secret key using the hashing algorithm specified in the JWT header. The resulting hashed data is assigned to hashedData. This hashed data is then base64url encoded to produce the JWT signature.

Now that we have created all three components, we can create the JWT. Remembering the header.payload.signature structure of the JWT, we simply need to combine the components, with periods (.) separating them.

JWT works best for single use tokens. Ideally, a new JWT must be generated for each use.

Acceptable use cases:

  • Server-to-server API calls, where the client can store a shared secret and generate a new JWT for each API call.
  • Give tokens an expiration : Technically, once a token is signed – it is valid forever – unless the signing key is changed or expiration explicitly set. Having an expiration in your JWT payload, a short one in particular, is important so that if old JWT ever get compromised, they will be considered invalid and can no longer be used.
  • As a way for one system to provide a logged in user limited access to another system.
  • No Database Table : This implies fewer DB queries, which implies faster response time.
  • Embrace HTTPS : Do not send tokens over non-HTTPS connections as those requests can be intercepted and tokens compromised. Having HTTPS helps prevents unauthorized users from stealing the sent JWT by making it so that the communication between the servers and the user cannot be intercepted.
  • Keep it secret. Keep it safe : The signing key should be treated like any other credentials and revealed only to services that absolutely need it.

To show how and why JWT are actually used, a simple 3 entity example (see the below diagram). The entities in this example are the user, the application server, and the authentication server. The authentication server will provide the JWT to the user. With the JWT, the user can then safely communicate with the application.

How an application uses JWT to verify the authenticity of a user.

JWT Authentication flow in Restful API:

We can implement below flow as well:

Events Around – Plan your Event – Your Event Guide

We are ecstatic to announce our All awaited Event Guide, Event Management Android application “Events Around”

What is Events Around !!

  • Create new public or private event
  • Share Events with friends
  • Join the event
  • Get Notifications for Events
  • Event Creator will get Notification if someone Join Event
  • Event Creator will get list of all Attendees
  • Post photos of event
  • Add event in calendar
  • Create wish list for event and share between friends.
  • Friends can select items from wish list
  • Share your event on social media platform

Find out things to do over the weekend when you are bored and where the parties are – try out new experiences with your friends !

Events Around is a free app that brings to you all the events and things to do in a city at one place.

You can find and plan awesome things to do on every day.

Don’t miss out on the awesome trekking experiences, great parties, Meetup and comedy events happening in your city. Getaway from the boredom of the routine.

This is a great app for those looking to try out different activities to engage, learn, network and have fun!

We would like to hear how we can become better! Drop us comment in below comment section!

Keep in touch! Don’t forget to review the App on Google Play Store!


Software Architecture

What is Software architecture?
Software architecture is the process of defining a structured solution that fulfils all of the technical and operational requirements, while optimizing common quality attributes such as performance, security, and manageability.

Architectural decision is based on several factors

Series of decisions based on a wide range of factors, and each of these decisions can have considerable impact on the quality, performance, maintainability, and overall success of the application.
Architectural decision includes the selection of the structural elements and their interfaces by which the system is composed.

Consider the following high level concerns when thinking about software architecture:
• How will the users be using the application?
• How will the application be deployed into production and managed?
• What are the quality attribute requirements for the application, such as security, performance, concurrency, internationalization, and configuration?
• How can the application be designed to be flexible and maintainable over time?
• What are the architectural trends that might impact your application now or after it has been deployed?
Software architectural documents need to be simple and to be created with different views based on requirement of viewers which can be business analyst, software developers, tech leads.

Role and Goal of Software architecture
Application architecture seeks to build a bridge between business requirements and technical requirements by understanding use cases, and then finding ways to implement those use cases in the software.
The goal of architecture is to identify the requirements that affect the structure of the application.
Good architecture are good leaders too, which need to gain team respect and can guide through technical implementation.
Software architecture should have quality of communication, collaboration, clarity and simplicity.
A good design is flexible enough to be able to handle the natural drift that will occur over time in hardware and software technology, as well as in user scenarios and requirements.
Keep in mind that the architecture should:
• Expose the structure of the system but hide the implementation details.
• Realize all of the use cases and scenarios.
• Try to address the requirements of various stakeholders.
• Handle both functional and quality requirements.
• Be visionary.

Take first step to become Software Architecture:
As in an initial step towards adapting role of Software Architecture you need to achieve more technical breadth.
In order to gain more technical breath is to convert stuff that you know but you don’t know to stuff that you know.
Stuff that you know – which you do everyday things you are expert in.
Stuff that you know, you don’t know – which you have heard from somewhere that is now a days in practice but you have never use it practically. For example you know about microservices but you have never coded any. Attend conferences and increase knowledge which in turn increases technical breadth.

Agile Methodology

“Agility is the ability to both create and respond to change in order to profit in a turbulent business environment. Agility is the ability to balance flexibility and stability.

1.    Frequent and rapid changes in market requirements and technology
2.   Increase in demand for innovative and speedier product development
3.   Increase in demand for reduced testing and experimentation costs
4.   Enhanced ability to deliver customer value at point of sale
5.   Increase in need for adaptive product development method

Continue reading “Agile Methodology”

Mobile Application Development

Samyak Infotech : Where the App Development Ideas Manifested In To Landmarks

People have to claim that the aspect of mobile app development has gone pretty average in modern times. They claim so pointing at the growing number of the developer or the companies offering such services. In other words, people want to witness something distinguishing all the time.

They claim, they have groundbreaking ideas, but no one is there to execute it. Samyak Infotech wants to address the above issue with absolute perfection. What makes Samyak Infotech the most distinctive is the fact that here we create the environment that lets you feel like your own development unit. We hear your requirements, and structure it in a way that can nullify the risk factors and hike the commercial value.

Continue reading “Mobile Application Development”