Skip to content

Latest commit

 

History

History
37 lines (31 loc) · 1.58 KB

README.md

File metadata and controls

37 lines (31 loc) · 1.58 KB

Rust and Actix Web - JWT Access and Refresh Tokens

This guide will walk you through the process of implementing RS256 JWT authentication with Rust, using asymmetric keys (private and public keys) to ensure strong security. The API will be hosted on a high-performance Actix Web server and will store data in a PostgreSQL database.

Rust and Actix Web - JWT Access and Refresh Tokens

Topics Covered

  • Run the Rust Actix Web Project Locally
  • Run the Rust API with a Frontend App
  • Setup the Rust Project
  • Setup PostgreSQL, Redis and pgAdmin with Docker
  • Database Migration with SQLX-CLI
  • Create the SQLX Database Model
  • Create the API Response Structs
  • Generate the RSA 256 Private and Public Keys
  • Load the Environment Variables into the App
  • Create Utility Functions to Sign and Verify the JWTs
    • Sign the JWT with the Private Key
    • Verify the JWT with the Public Key
  • Create a JWT Authentication Middleware
  • Create the Actix Web Route Handlers
    • Register User Route Function
    • Login User Route Function
    • Refresh JWT Route Function
    • Logout User Route Function
    • Get Authenticated User Route Function
    • Merge the Route Handlers
  • Connect to the Database and Register the Routes
  • Test the RSA 256 Rust Project
    • User Registration
    • User Login
    • Request Account Details
  • Conclusion

Read the entire article here: https://codevoweb.com/rust-actix-web-jwt-access-and-refresh-tokens/