-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWT opaque token || blacklist/deny list #928
Comments
actually a session cookie (as per dbAuth) along with the token could do the trick. One could check both the validity of the token and presence of the cookie. Removing the session cookie on logout would invalidate the actual session. |
It is an interesting idea to allow for invalidating your long lived tokens. In a username/password situation one would just clear the password hash to disable an account. A JWT token cannot be invalidated that easy and that's where the idea comes from. Not a bad idea. On the other hand there is a reason why people do frequent key rotation. This is a difficult topic.
It would, but that's not what this is about. It is about denying somebody you once gave access to further use their token, even though other tokens signed with the same key should stay valid. |
the last part of the article opens to opaque token and key rotation. would be painful to implement that? |
in case of using auth.php pointing to the same db, we could keep the session id across the api.php instances, and check the correspondence between the session stored in the claims and the value of the cookie. |
what about putting up something like this?
The text was updated successfully, but these errors were encountered: