Skip to content

Commit e19d34d

Browse files
authored
Merge pull request jsonwebtoken#588 from miparnisari/fga
Reference FGA in the introduction
2 parents 6011376 + 6e87aa4 commit e19d34d

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

views/website/md/introduction.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,8 @@ Authorization: Bearer <token>
105105

106106
This can be, in certain cases, a stateless authorization mechanism. The server's protected routes will check for a valid JWT in the `Authorization` header, and if it's present, the user will be allowed to access protected resources. If the JWT contains the necessary data, the need to query the database for certain operations may be reduced, though this may not always be the case.
107107

108+
Note that if you send JWT tokens through HTTP headers, you should try to prevent them from getting too big. Some servers don't accept more than 8 KB in headers. If you are trying to embed too much information in a JWT token, like by including all the user's permissions, you may need an alternative solution, like [Auth0 Fine-Grained Authorization](https://auth0.com/developers/lab/fine-grained-authorization).
109+
108110
If the token is sent in the `Authorization` header, Cross-Origin Resource Sharing (CORS) won't be an issue as it doesn't use cookies.
109111

110112
The following diagram shows how a JWT is obtained and used to access APIs or resources:

0 commit comments

Comments
 (0)