verifiable-token-based-authentication

verifiable-token-based-authentication

Security pattern for self-contained token authentication (e.g., JWT). Use when implementing stateless authentication, designing tokens with embedded claims, or building systems where tokens contain principal information and can be verified without server-side storage. Specialization of Authentication pattern.

2étoiles
1forks
Mis à jour 1/22/2026
SKILL.md
readonlyread-only
name
verifiable-token-based-authentication
description

Security pattern for self-contained token authentication (e.g., JWT). Use when implementing stateless authentication, designing tokens with embedded claims, or building systems where tokens contain principal information and can be verified without server-side storage. Specialization of Authentication pattern.

Verifiable Token-Based Authentication Security Pattern

A subject is authenticated using a token that itself contains the necessary information to determine the principal. The system verifies the token is valid (not tampered, not expired) without needing to look up stored evidence.

Core Components

Role Type Responsibility
Subject Entity Provides token with action requests
Enforcer Enforcement Point Ensures token verification before processing
Verifier Decision Point Manages token validity verification
Cryptographer Cryptographic Primitive Verifies token integrity
Key Manager Entity Manages cryptographic keys
Registrar Entity Issues tokens after initial authentication

Data Elements

  • token: Self-contained credential with principal and metadata
  • principal: Identity extracted from valid token
  • expiration: Token validity period
  • signature/MAC: Cryptographic integrity protection

Token Structure

A verifiable token must contain:

  1. Principal identifier (username, user ID, email)
  2. Expiration date/time
  3. Cryptographic signature or MAC
  4. Optional: Additional claims (roles, permissions, metadata)

Token Integrity Verification

Two approaches:

Digital Signature (Asymmetric)

  • Token signed with private key
  • Verified with public key
  • Enables verification without sharing signing key
  • Use RSA (min 2048 bits) or ECDSA (min 256 bits)

MAC (Symmetric)

  • Token authenticated with shared secret
  • Same key for creation and verification
  • Use HMAC with min 128-bit keys

Recommendation: Use cryptographic keys with at least 128 bits of entropy.

Verification Flow

Subject → [action + token] → Enforcer
Enforcer → [token] → Verifier
Verifier → [get key] → Key Manager
Key Manager → [key] → Verifier
Verifier → [verify integrity] → Cryptographer
Cryptographer → [result] → Verifier
Verifier → [check expiration, extract principal] → Verifier
Verifier → [principal or error] → Enforcer

Verification steps:

  1. Verify integrity (signature/MAC)
  2. Check expiration date
  3. Check revocation status (if implemented)
  4. Extract and return principal

Token Registration (Issuance)

  1. Subject authenticates via other means (e.g., password)
  2. Registrar generates token with:
    • Principal identifier
    • Expiration date
    • Additional claims
    • Cryptographic signature/MAC
  3. Token returned to Subject

Security Considerations

Token Lifetime

  • Shorter = more secure, less convenient
  • Include absolute expiration
  • Consider refresh token pattern for long sessions

Token Revocation

  • Stateless tokens cannot be directly revoked
  • Options: short lifetimes, revocation lists, token versioning

Token Storage (Client-Side)

  • Web: HttpOnly, Secure cookies or secure storage
  • Mobile: Secure enclave/keychain
  • Never store in localStorage for sensitive apps

Token Transmission

  • Always use HTTPS
  • Consider token binding

No Token Reset

  • Tokens should never be reset on request
  • Subject must re-authenticate for new token

Integrity is Paramount

  • Never accept tampered tokens
  • Verify signature before trusting any claims

Common Implementation: JWT

JSON Web Tokens follow this pattern:

  • Header: algorithm, type
  • Payload: claims (principal, exp, iat, etc.)
  • Signature: cryptographic verification

Warning: Always verify signature; never use "none" algorithm.

Implementation Checklist

  • [ ] Strong signing algorithm (RS256, ES256, HS256)
  • [ ] Expiration claim enforced
  • [ ] Signature verified before trusting claims
  • [ ] Keys managed securely
  • [ ] Transmission over HTTPS only
  • [ ] Appropriate token lifetime
  • [ ] Revocation strategy defined

References

You Might Also Like

Related Skills

coding-agent

coding-agent

179Kdev-codegen

Run Codex CLI, Claude Code, OpenCode, or Pi Coding Agent via background process for programmatic control.

openclaw avataropenclaw
Obtenir
add-uint-support

add-uint-support

97Kdev-codegen

Add unsigned integer (uint) type support to PyTorch operators by updating AT_DISPATCH macros. Use when adding support for uint16, uint32, uint64 types to operators, kernels, or when user mentions enabling unsigned types, barebones unsigned types, or uint support.

pytorch avatarpytorch
Obtenir
at-dispatch-v2

at-dispatch-v2

97Kdev-codegen

Convert PyTorch AT_DISPATCH macros to AT_DISPATCH_V2 format in ATen C++ code. Use when porting AT_DISPATCH_ALL_TYPES_AND*, AT_DISPATCH_FLOATING_TYPES*, or other dispatch macros to the new v2 API. For ATen kernel files, CUDA kernels, and native operator implementations.

pytorch avatarpytorch
Obtenir
skill-writer

skill-writer

97Kdev-codegen

Guide users through creating Agent Skills for Claude Code. Use when the user wants to create, write, author, or design a new Skill, or needs help with SKILL.md files, frontmatter, or skill structure.

pytorch avatarpytorch
Obtenir

Implements JavaScript classes in C++ using JavaScriptCore. Use when creating new JS classes with C++ bindings, prototypes, or constructors.

oven-sh avataroven-sh
Obtenir

Creates JavaScript classes using Bun's Zig bindings generator (.classes.ts). Use when implementing new JS APIs in Zig with JSC integration.

oven-sh avataroven-sh
Obtenir