You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add FAQPage schema, Organization schema, and llms.txt
- Implement FAQPage structured data on /introduction with 7 Q&A items (EN/JA)
- Add Organization schema with Auth0 sameAs links (Twitter, Facebook, LinkedIn)
- Create llms.txt for AI agent discoverability with JWT skill installation info
- Exclude llms.txt from i18n middleware routing
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
"JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA.",
85
+
},
86
+
{
87
+
question: "When should you use JSON Web Tokens?",
88
+
answer:
89
+
"JWTs are useful for Authorization (allowing users to access routes, services, and resources after login using Single Sign-On) and Information Exchange (securely transmitting information between parties with verified signatures that ensure the content hasn't been tampered with).",
90
+
},
91
+
{
92
+
question: "What is the JSON Web Token structure?",
93
+
answer:
94
+
"A JWT consists of three parts separated by dots: Header (contains the token type and signing algorithm), Payload (contains the claims - statements about the user and additional data), and Signature (ensures the token hasn't been altered). Each part is Base64Url encoded, resulting in the format: xxxxx.yyyyy.zzzzz",
95
+
},
96
+
{
97
+
question: "How do JSON Web Tokens work?",
98
+
answer:
99
+
"When a user logs in, they receive a JWT. For subsequent requests, the token is sent in the Authorization header using the Bearer schema. The server verifies the token's signature and grants access to protected resources. This stateless mechanism allows the token to be used across different domains.",
100
+
},
101
+
{
102
+
question: "Why should we use JSON Web Tokens?",
103
+
answer:
104
+
"JWTs are more compact than SAML tokens (XML-based), making them ideal for HTML and HTTP environments. JSON is simpler to parse than XML and maps directly to objects in most programming languages. JWTs support asymmetric signing and work seamlessly across different platforms and devices.",
105
+
},
106
+
{
107
+
question: "What is the difference between validating and verifying a JWT?",
108
+
answer:
109
+
"Validation checks the token's structure, format, and claims (like expiration time and required fields). Verification confirms the cryptographic signature to ensure the token was issued by a trusted party and hasn't been tampered with. Both steps are essential for secure JWT processing.",
110
+
},
111
+
{
112
+
question: "What is the difference between decoding and encoding a JWT?",
113
+
answer:
114
+
"Encoding is the process of creating a JWT: converting the header and payload to JSON, Base64Url encoding them, and generating the signature. Decoding reverses this process: splitting the token, Base64Url decoding each part, and parsing the JSON. Decoding alone doesn't verify the signature.",
"JSON Web Token(JWT)は、当事者間で情報をJSONオブジェクトとして安全に伝送するためのコンパクトで自己完結型の方法を定義するオープンスタンダード(RFC 7519)です。この情報は、秘密鍵(HMACアルゴリズム)またはRSAやECDSAを使用した公開鍵/秘密鍵のペアでデジタル署名されているため、検証および信頼できます。",
0 commit comments