iFor educational purposes only. All data, products, and interactions shown here are entirely fictional mock examples — this is not a real product and nothing is for sale.
Auth Flow
Simulates a JWT authentication flow: credentials → server validation → token generation →
protected resource access. Shows token anatomy and RBAC.
Login
Demo credentials: any email + password ≥8 chars
AUTH FLOW STEPS
1
Credential Validation
Checking email + BCrypt password hash against user store…
2
JWT Token Generation
Signing HS256 JWT with subject, role claims, and expiry…
3
Token Issued
Access token (1h) + Refresh token (7d) returned…
4
Protected Route Access
Bearer token validated by middleware — resource returned…