{"id":253,"date":"2023-10-06T17:01:47","date_gmt":"2023-10-06T11:31:47","guid":{"rendered":"https:\/\/www.thehashcode.com\/?p=253"},"modified":"2026-03-25T13:33:33","modified_gmt":"2026-03-25T08:03:33","slug":"what-is-json-web-token","status":"publish","type":"post","link":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/","title":{"rendered":"What is JWT (JSON Web Token)?"},"content":{"rendered":"\n<p><strong>Introduction of JSON Web Token (JWT) <\/strong><\/p>\n\n\n\n<p> JSON Web Token (JWT) has emerged as a popular solution for secure authentication, authorization, and data exchange between parties. In this comprehensive guide, we will delve deep into JWT, exploring its architecture, working principles, use cases, and best practices. Here is <a href=\"https:\/\/medium.com\/@affinecipher\/top-5-jwt-decode-online-website-b455b565824c\">Top 5 jwt decode online website<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding the Basics<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is a JWT?<\/h3>\n\n\n\n<p>A JSON Web Token, or JWT, is a compact, self-contained, and digitally signed token format used for securely transmitting information between parties. These parties can be a user, a client, a server, or any two entities engaged in a data exchange. Authentication and authorization mechanisms commonly utilize JWTs to ensure data integrity and authenticity.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">JWT Structure<\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/www.thehashcode.com\/wp-content\/uploads\/2023\/10\/Untitled-design-1024x576.png\" alt=\"JWT Structure\" class=\"wp-image-2846\" srcset=\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/Untitled-design-1024x576.png 1024w, https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/Untitled-design-300x169.png 300w, https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/Untitled-design-768x432.png 768w, https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/Untitled-design.png 1366w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>JWTs consist of three parts, each separated by a period (.) and encoded in Base64:<\/p>\n\n\n\n<ol>\n<li><strong>Header<\/strong>: Contains metadata about the token, such as the signing algorithm used.<\/li>\n\n\n\n<li><strong>Payload<\/strong>: Contains claims, which are statements about an entity (typically, a user) and additional data. Claims can be classified into three types:\n<ul>\n<li><strong>Registered Claims<\/strong>: These claims have predefined meanings that are well-known. Examples include <strong>iss <\/strong>(issuer), <strong>exp <\/strong>(expiration time), and <strong>sub <\/strong>(subject).<\/li>\n\n\n\n<li><strong>Public Claims<\/strong>: These are user-defined claims intended to share information between parties. For example, <strong>role <\/strong>or <strong>email<\/strong>.<\/li>\n\n\n\n<li><strong>Private Claims<\/strong>: These customs claims are employed by parties that have reached mutual agreement but are not designed for wider usage.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Signature<\/strong>: Ensures the integrity and authenticity of the token. The generation process involves hashing the encoded header and payload with a secret key, utilizing the specified algorithm.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">How JWT Works?<\/h3>\n\n\n\n<p>The lifecycle of a JWT involves three main processes:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Token Creation (Authentication)<\/strong><\/h3>\n\n\n\n<p>When a user logs in or authenticates, a JWT is created on the server. The server generates the header and payload, signs the token using a secret key, and sends it back to the client as a response.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Token Transmission<\/h3>\n\n\n\n<p>The client stores the JWT (usually in a browser&#8217;s <strong>localStorage <\/strong>or <strong>sessionStorage<\/strong>), and for each subsequent request to a protected resource, it sends the JWT in the <strong>Authorization <\/strong>header. This allows the server to verify the user&#8217;s identity and access permissions based on the token&#8217;s claims.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Token Validation<\/h3>\n\n\n\n<p>Upon receiving the JWT, the server decodes the header and payload, verifies the signature using the shared secret key, and checks the token&#8217;s validity (e.g., expiration time). If the token is valid, the server responds to the client&#8217;s request; otherwise, it denies access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Use Cases for JWT<\/h2>\n\n\n\n<p>JWTs find applications in various scenarios, primarily centered around authentication, authorization, and secure data transmission:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. User Authentication<\/h3>\n\n\n\n<p>JWTs are commonly used for user authentication. After a successful login, the server issues a JWT to the client, who then includes it in subsequent requests. This eliminates the need for session management on the server and reduces database queries.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Single Sign-On (SSO)<\/h3>\n\n\n\n<p>JWTs enable Single Sign-On solutions, where a user logs in once and gains access to multiple services or applications without needing to reauthenticate. The JWT holds the user&#8217;s identity and is recognized by all participating services.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Authorization and Access Control<\/h3>\n\n\n\n<p>JWTs carry user role and permission information, allowing servers to grant or deny access to specific resources or functionalities based on the user&#8217;s claims.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Secure API Communication<\/h3>\n\n\n\n<p>JWTs are used to secure communication between services or microservices in a distributed architecture. By validating incoming JWTs, services can ensure that requests are genuine and come from authorized sources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Mobile Application Authentication<\/h3>\n\n\n\n<p>Mobile apps often use JWTs for user authentication, as they are easy to store and transmit. This simplifies the development of authentication mechanisms for mobile platforms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. IoT Device Authentication<\/h3>\n\n\n\n<p>In the Internet of Things (IoT) ecosystem, JWTs can be used to authenticate and secure communication between IoT devices and servers. Each device can be issued a JWT for identification.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices and Security Considerations<\/h2>\n\n\n\n<p>While JWTs offer many benefits, they also come with certain security considerations. Here are some best practices to follow:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Use Strong Key Management<\/h3>\n\n\n\n<p>The secret key used for signing JWTs should be kept secure. Regularly rotate keys and implement robust key management practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Validate and Verify<\/h3>\n\n\n\n<p>Always validate the JWT&#8217;s signature and verify the token&#8217;s claims, including the expiration time (<strong>exp<\/strong>) and issuer (<strong>iss<\/strong>). Failing to do so can lead to security vulnerabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Avoid Storing Sensitive Data<\/h3>\n\n\n\n<p>Avoid storing sensitive information like passwords in JWTs. Instead, store only a reference or identifier and keep sensitive data on the server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Implement Token Expiration<\/h3>\n\n\n\n<p>Set a reasonably short expiration time for JWTs to limit their validity. This reduces the risk associated with stolen tokens.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Use HTTPS<\/h3>\n\n\n\n<p>To safeguard against eavesdropping and man-in-the-middle attacks, it is essential to encrypt all JWT-related communication using HTTPS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Be Cautious with Public Claims<\/h3>\n\n\n\n<p>Public claims in JWTs can be visible to anyone who has access to the token. Be cautious about what information you include in these claims. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>JSON Web Tokens (JWTs) are a versatile and secure means of transmitting information between parties. Their compact format, self-contained nature, and digital signature make them ideal for authentication, authorization, and secure data exchange in a wide range of applications.<\/p>\n\n\n\n<p>Understanding how JWTs work, their structure, and best practices for their use is essential for developers and security professionals. When employed appropriately, JWTs can greatly improve the security and efficiency of your applications, facilitating secure communication and user authentication across a wide range of services and platforms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction of JSON Web Token (JWT) JSON Web Token (JWT) has emerged as a popular solution for secure authentication, authorization, and data exchange between parties. In this comprehensive guide, we&#8230;<\/p>\n","protected":false},"author":4,"featured_media":2853,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,22,27,28],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Explain JSON Web Token (JWT)<\/title>\n<meta name=\"description\" content=\"Explore JWT ( JSON Web Token ) Structure: Learn how they work, use cases, security best practices, and more in this comprehensive guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Explain JSON Web Token (JWT)\" \/>\n<meta property=\"og:description\" content=\"Explore JWT ( JSON Web Token ) Structure: Learn how they work, use cases, security best practices, and more in this comprehensive guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\" \/>\n<meta property=\"og:site_name\" content=\"The Hash Code\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-06T11:31:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T08:03:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John smith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\"},\"author\":{\"name\":\"John smith\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/person\/2816f5cab2b36dcb8103f810fda4ba66\"},\"headline\":\"What is JWT (JSON Web Token)?\",\"datePublished\":\"2023-10-06T11:31:47+00:00\",\"dateModified\":\"2026-03-25T08:03:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\"},\"wordCount\":896,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png\",\"articleSection\":[\"Blog\",\"Javascript\",\"JSON\",\"NVM\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\",\"url\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\",\"name\":\"Explain JSON Web Token (JWT)\",\"isPartOf\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png\",\"datePublished\":\"2023-10-06T11:31:47+00:00\",\"dateModified\":\"2026-03-25T08:03:33+00:00\",\"description\":\"Explore JWT ( JSON Web Token ) Structure: Learn how they work, use cases, security best practices, and more in this comprehensive guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage\",\"url\":\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png\",\"contentUrl\":\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png\",\"width\":1366,\"height\":768,\"caption\":\"What is JWT (JSON Web Token)?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.thehashcode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is JWT (JSON Web Token)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#website\",\"url\":\"https:\/\/www.thehashcode.com\/blogs\/\",\"name\":\"The Hash Code\",\"description\":\"All about JavaScript, NodeJS, Wordpress , System Programming and Linux.\",\"publisher\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.thehashcode.com\/blogs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#organization\",\"name\":\"The Hash Code\",\"url\":\"https:\/\/www.thehashcode.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/08\/cropped-cropped-the-hash-code-1.png\",\"contentUrl\":\"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/08\/cropped-cropped-the-hash-code-1.png\",\"width\":512,\"height\":512,\"caption\":\"The Hash Code\"},\"image\":{\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/person\/2816f5cab2b36dcb8103f810fda4ba66\",\"name\":\"John smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bc02703176129b3fb835b31fb83f8aa2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bc02703176129b3fb835b31fb83f8aa2?s=96&d=mm&r=g\",\"caption\":\"John smith\"},\"url\":\"https:\/\/www.thehashcode.com\/blogs\/author\/john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Explain JSON Web Token (JWT)","description":"Explore JWT ( JSON Web Token ) Structure: Learn how they work, use cases, security best practices, and more in this comprehensive guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/","og_locale":"en_GB","og_type":"article","og_title":"Explain JSON Web Token (JWT)","og_description":"Explore JWT ( JSON Web Token ) Structure: Learn how they work, use cases, security best practices, and more in this comprehensive guide.","og_url":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/","og_site_name":"The Hash Code","article_published_time":"2023-10-06T11:31:47+00:00","article_modified_time":"2026-03-25T08:03:33+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png","type":"image\/png"}],"author":"John smith","twitter_card":"summary_large_image","twitter_misc":{"Written by":"John smith","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#article","isPartOf":{"@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/"},"author":{"name":"John smith","@id":"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/person\/2816f5cab2b36dcb8103f810fda4ba66"},"headline":"What is JWT (JSON Web Token)?","datePublished":"2023-10-06T11:31:47+00:00","dateModified":"2026-03-25T08:03:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/"},"wordCount":896,"commentCount":0,"publisher":{"@id":"https:\/\/www.thehashcode.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png","articleSection":["Blog","Javascript","JSON","NVM"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/","url":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/","name":"Explain JSON Web Token (JWT)","isPartOf":{"@id":"https:\/\/www.thehashcode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage"},"image":{"@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png","datePublished":"2023-10-06T11:31:47+00:00","dateModified":"2026-03-25T08:03:33+00:00","description":"Explore JWT ( JSON Web Token ) Structure: Learn how they work, use cases, security best practices, and more in this comprehensive guide.","breadcrumb":{"@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#primaryimage","url":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png","contentUrl":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/10\/What-is-JWT-JSON-Web-Token.png","width":1366,"height":768,"caption":"What is JWT (JSON Web Token)?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thehashcode.com\/blogs\/json\/what-is-json-web-token\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thehashcode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"What is JWT (JSON Web Token)?"}]},{"@type":"WebSite","@id":"https:\/\/www.thehashcode.com\/blogs\/#website","url":"https:\/\/www.thehashcode.com\/blogs\/","name":"The Hash Code","description":"All about JavaScript, NodeJS, Wordpress , System Programming and Linux.","publisher":{"@id":"https:\/\/www.thehashcode.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thehashcode.com\/blogs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.thehashcode.com\/blogs\/#organization","name":"The Hash Code","url":"https:\/\/www.thehashcode.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/08\/cropped-cropped-the-hash-code-1.png","contentUrl":"https:\/\/www.thehashcode.com\/blogs\/wp-content\/uploads\/2023\/08\/cropped-cropped-the-hash-code-1.png","width":512,"height":512,"caption":"The Hash Code"},"image":{"@id":"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/person\/2816f5cab2b36dcb8103f810fda4ba66","name":"John smith","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.thehashcode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bc02703176129b3fb835b31fb83f8aa2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc02703176129b3fb835b31fb83f8aa2?s=96&d=mm&r=g","caption":"John smith"},"url":"https:\/\/www.thehashcode.com\/blogs\/author\/john\/"}]}},"_links":{"self":[{"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/posts\/253"}],"collection":[{"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":14,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":2852,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/posts\/253\/revisions\/2852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/media\/2853"}],"wp:attachment":[{"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thehashcode.com\/blogs\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}