JWT Signing Keys greatly improve the performance of Supabase Auth, by making it possible to validate your user's JWT in your app, rather than waiting to resolve a network request on the Supabase Auth Server. In this video, Jon Meyers demonstrates how to roll your Supabase project's keys over to JWT Signing Keys. 00:00 Supabase makes Authentication and Authorization simple 00:35 Overview of app 01:09 Refactor to use getClaims instead of getUser 02:27 Symmetric vs Asymmetric JWTs 03:56 Refactor Middleware to use getClaims on every page load 06:19 Enabling JWT Signing Keys 08:20 Migrating to new API Keys 10:13 Rotating and revoking JWT keys 12:22 Showing the performance benefits of Asymmetric JWTs 12:52 A single command to bootstrap app with JWT Signing Keys 14:41 Let's learn about Branching 💻 Videos to watch next: ▶ Branching just got a whole lot easier: ▶ 5 tips to make you a PRO at Cursor: ▶ My new FAVORITE way to use Supabase: 👇 Learn more about Supabase 👇 🕸 Website: 🏁 Get started: 📄 Docs: 🔔 Subscribe for more tutorials and feature updates from Supabase: 📱 Connect with Us: 🐙 Github: 💬 Discord: 🐦 Twitter: ▶ Instagram (follow for memes): ABOUT SUPABASE: Supabase is the open source Firebase alternative. Supabase provides a full Postgres database for every project with pgvector, backups, realtime, and more. Add and manage email and password, passwordless, OAuth, and mobile logins to your project through a suite of identity providers and APIs. Build in a weekend, scale to millions. #Supabase #AppDevelopment #DeveloperTools











