Token Based Auth System [state-less]
In a token-based system, HS256 and RS256 are the two most common algorithms used to sign the token.
1. HS256
This method is mostly used in monolith application, where it only requires single key.
onkark.hashnode.dev2 min read