
Presented by:
Isabelle Mauny
Field CTO and Co-founder
JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT standards are quite complex and it’s very easy to get the implementation wrong. As a result, data breaches and API vulnerabilities due to poor JWT implementation, token leakage, and lack of proper validation remain widespread.
This webinar focuses on JWT best practices, most common JWT attacks and how the 42Crunch API Security Platform leverages OpenAPI (Swagger) Specification extensions to prevent them.
In this webinar you will learn:
- How to best use JWTs for API Security
- Most common attacks as illustrated in RFC 8725
- How 42Crunch can help you protect your APIs from those attacks
Webinar Follow-up
Hope you enjoyed the webinar! Below you can download the slide deck, visit our blog
for full Q&A and learn more about 42Crunch!

How to Best Leverage JWTs for API Security Slide Deck
Download
How to Best Leverage JWTs for API Security Q&A Blog
Read the Blog
42Crunch API Security
Platform Data Sheet
Free Tools: Check out our free API Security Tools that you can add to your IDE and CI/CD!
Resources
Want to learn more? Here are some resources to help you out.

Free Tools
Looking to make OpenAPI / Swagger editing easier? Or want to see how secure your API is? Check out our free tools.
Get the Tools!
API Security Top 10
Learn more about the OWASP API Security Top 10, how 42Crunch can help, and download our cheat sheet!
Learn More
Better Together
Already have API Management? Great! The 42Crunch API Security Platform is the perfect compliment. Get the data sheet.
DownloadReady to Get Started?
Developer-first solution for delivering API security as code.