DEV Community

Discussion on: JWT can fit as an authentication system with a blacklist technique

Collapse
 
adaptive-shield-matrix profile image
Adaptive Shield Matrix

Isn't this very rare (purely theoretical) use case?

If you delete the JWT from users device memory and storage ->
How does someone use a "technically still usable" token if its nowhere to be found?

I assume

  • you have protection against XSS and CSRF in place, which you need either way
  • you generate a individual token for each device you log into -> so even if you share the link the user still has to re-login
Thread Thread
 
ryansgi profile image
Ryan B

It boils down to a principle I adopted a long time ago: Never trust user input.