The Core of your Trust Infrastructure … Access Tokens

Prof Bill Buchanan OBE FRSE
6 min readJan 24, 2024

We are increasingly moving to trust infrastructures that are based on claims to the usage of services, and these are granted with signed tokens that provide access. The trust level is defined by the entity that signed the token.

For a JWT token, we can either sign with a MAC (Message Authentication Code) or use public key encryption (EC or RSA). As an introduction, here…

--

--

Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.