Using JWT with OAuth 2.0 for third-party authentication
Securing WebSocket communications with JWTs
Implementing token-based authentication for mobile apps with JWTs
Using JWTs for user impersonation and delegation
Implementing single sign-on (SSO) with JWTs