<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Authentication on Sohil Ladhani Blog</title><link>https://sohilladhani.com/blog/tags/authentication/</link><description>Recent content in Authentication on Sohil Ladhani Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 19 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://sohilladhani.com/blog/tags/authentication/index.xml" rel="self" type="application/rss+xml"/><item><title>Token Revocation and Blacklisting</title><link>https://sohilladhani.com/blog/post/2026-04-19-token-revocation-and-blacklisting/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://sohilladhani.com/blog/post/2026-04-19-token-revocation-and-blacklisting/</guid><description>You log out. Your JWT is still valid. The server has no record it was ever issued. This is the stateless token revocation problem.
Why Revocation Is Hard JWTs are stateless by design. The server validates a token by checking the signature and expiry. It doesn&amp;rsquo;t consult a database. This is what makes them fast and scalable. But it means there&amp;rsquo;s no central list of &amp;ldquo;valid tokens&amp;rdquo; to update when a token should no longer be accepted.</description></item><item><title>OAuth 2.0 Authorization Flows</title><link>https://sohilladhani.com/blog/post/2026-04-18-oauth2-authorization-flows/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://sohilladhani.com/blog/post/2026-04-18-oauth2-authorization-flows/</guid><description>OAuth 2.0 is not an authentication protocol. It&amp;rsquo;s an authorization protocol. That confusion is the root of most OAuth misuse.
What OAuth Actually Does OAuth lets a user grant a third-party application limited access to their account without sharing their password. The user sees a consent screen listing what the app wants to access. They approve. The app gets a token with exactly those permissions. Your password never leaves the authorization server.</description></item><item><title>JWT and Token-Based Auth</title><link>https://sohilladhani.com/blog/post/2026-04-17-jwt-token-based-auth/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>https://sohilladhani.com/blog/post/2026-04-17-jwt-token-based-auth/</guid><description>The server doesn&amp;rsquo;t remember you. Every request carries proof of who you are. That&amp;rsquo;s the point of a token.
The Structure A JWT is three base64url-encoded segments joined by dots: header, payload, signature. The header says which algorithm signed it. The payload carries claims: user ID, roles, expiry time. The signature is a cryptographic proof that the header and payload haven&amp;rsquo;t been tampered with.
The server doesn&amp;rsquo;t need a database lookup to verify a JWT.</description></item></channel></rss>