Hi,We do have an embedded application and we do use our own JWT tokens & along with 0Auth authentication.We do actually verify a request by processing it through HMAC-SHA256 hash function & afterwands we fetch a JWT token & authorize further requests...