loading...

re: Using JWTs for Authentication in RESTful Applications VIEW POST

TOP OF THREAD FULL DISCUSSION
re: Quite timely I have recently asked a question in relation to this here: dev.to/imthedeveloper/critique-my-... Something that interests me is the s...
 

A really good point; maybe one of our security wonks will drop in and offer an opinion.

One approach might be to use the JWT in combination with a session identifier which changes on each request/response pair. The client would need to present both the signed JWT and the correct session identifier; both would be sent on the request automatically and both would be deleted when the browser or tab is closed. On the server side, seeing the same session identifier twice would be an error and would indicate a possible attack.

Also, requiring HTTPS would reduce the chance of a man-in-the-middle or sniffing attack.

In your case, where some data needs to be visible on the client, I think I'd still use the secure JWT and then send a second object back on the response with the data.

Code of Conduct Report abuse