This document discusses using bearer JWT tokens for authorization in distributed systems without a central authority. It motivates this approach by describing requirements for decentralization, privacy, and reducing complexity. It then explains how bearer tokens work by containing a signature, claims about permissions, and how verification is done to apply permissions to ephemeral users. Finally it discusses some caveats, examples of usage, and resources for further information.