Home / Companies / Daily / Blog / Post Details
Content Deep Dive

Obtaining, handling, and validating meeting tokens in your video application

Blog post from Daily

Post Details
Company
Date Published
Author
Liza Shulyayeva
Word Count
2,551
Language
English
Hacker News Points
-
Summary

This is a summary of the key points about Daily's meeting tokens, which are used in the social gaming series Code of Daily: Modern Wordfare. Meeting tokens are JSON Web Tokens (JWTs) that contain user options and permissions for daily calls, and can be obtained from Daily's REST API or self-signed using an API key. The tokens are used to grant access to privileged resources or operations when joining a video call, and should be handled with care to avoid malicious use. Meeting tokens can be stored persistently on the client-side, but this requires careful consideration of security risks such as Cross-Site Scripting Attacks (XSS) and Cross-Site Request Forgery (CSRF). To validate meeting tokens, developers can use Daily's REST API or check their own signatures using a library like jsonwebtoken. The token payload contains claims such as expiry time, room name, and is_owner, which should be checked before validating the signature or making an HTTP request to Daily's validation endpoint.