Follow the steps outlined in “Security using JWT” and modify the project so the authentication and authorization are performed using JWT.