bg_image
header

JavaScript Object Notation - JSON

JSON (JavaScript Object Notation) is a lightweight data format used for representing structured data in a text format. It is commonly used for data exchange between a server and a web application. JSON is easy for humans to read and write, and easy for machines to parse and generate.

Here are some basic features of JSON:

  1. Syntax:

    • JSON data is organized in key-value pairs.
    • A JSON object is enclosed in curly braces {}.
    • A JSON array is enclosed in square brackets [].
  2. Data Types:

    • Strings: "Hello"
    • Numbers: 123 or 12.34
    • Objects: {"key": "value"}
    • Arrays: ["element1", "element2"]
    • Booleans: true or false
    • Null: null
  3. Example:

{
    "name": "John Doe",
    "age": 25,
    "address": {
        "street": "123 Main St",
        "city": "Anytown"
    },
    "hobbies": ["reading", "writing", "traveling"]
}

In this example, the JSON object contains information about a person including their name, age, address, and hobbies.

  1. Uses:
    • Web APIs: JSON is often used in web APIs to exchange data between clients and servers.
    • Configuration files: Many applications use JSON files for configuration.
    • Databases: Some NoSQL databases like MongoDB store data in a JSON-like BSON format.

JSON has become a standard format for data exchange on the web due to its simplicity and flexibility.

 

 


JSON Web Token - JWT

A JSON Web Token (JWT) is a compact, secure, and self-describing format for exchanging information between parties. It consists of a JSON structure that has three parts: the header, the payload, and the signature.

  1. Header: The header contains metadata about the type of the token and the signature algorithm used.

  2. Payload: The payload contains the actual claims or information carried by the token. These claims can include user data, roles, permissions, etc.

  3. Signature: The signature is used to ensure that the token has not been tampered with. It is created by signing the header, payload, and a secret key (known only to the issuer of the token).

JWTs are commonly used for authentication and authorization in web applications. For example, they can be used to authenticate users after login and grant them access to specific resources by being stored in HTTP headers or HTTP cookies and exchanged between the client and the server.


Random Tech

Zend Framework


ZendFramework-Logo.png