# Tightening Bearer Token Authentication with Proof-of-Possession Tokens

In token-based architecture, tokens represent the client’s entitlement to access protected resources. Access tokens (or bearer tokens as they're commonly known) are issued by authorization servers after successful user authentication. The tokens are passed as credentials in the request to the…
[](/blog/engineering/mtls-sender-constrained-tokens)












