DEV Community

Cover image for JwtToken vs Cookie vs SessionID
TechWorld with Nana
TechWorld with Nana

Posted on • Updated on

JwtToken vs Cookie vs SessionID

What is JwtToken (JSON Web Token) and how does it differ from an older concept of a cookie?

On Stack-Overflow I saw a couple of questions about "JwtToken vs Cookie” or "JwtToken instead of Cookie". The fact is, JwtToken is not a direct alternative of a cookie, but rather of a SessionId. What does it exactly mean? It means, you can store the JwtToken in a cookie, just like you would store a SessionId.

The below image shows a JwtToken stored in a cookie named "access_token":

Cookie

The advantage of a JwtToken over a SessionId is that JwtToken has a built-in validation mechanism. For example when validating the token in your backend, you can check whether it has been tampered with.

This is a sample backend validation of the jwtToken:
Jwt Parse Logic

Also you can store user id in the token itself. The most important advantage is JwtTokens are stateless, since they contain all the necessary info for validation, so you don't need to store them in a db, like SessionId. Whereas sessionIds need to be stored so they can be later validated. This is especially useful when you have distributed systems where nodes don’t necessarily share a db or some other storage.

Another point we can discuss is: storing JwtToken in a cookie vs. storing it directly in a local/session storage. The advantage of storing it in a cookie is, you can secure cookie using flags. ‘httpOnly’ flag prevents programmatic access and manipulation of a cookie through Javascript. ‘secure’ forces https connection to transfer the cookie, so the sensitive data won’t be transferred in plain text.

There are some UX standards that define expiration times for both JwtToken and cookie. As always, there is a tradeoff here between user convenience and security. Standard is to set JwtToken validity to a week, while refreshing the JwtToken and prolonging the validity every 15 minutes or so. The reason for refreshing token is to refresh the access rights attached to the token frequently in case they change.

Important note here: anyone who has a JwtToken can actually decrypt it online on https://jwt.io/. So, make sure NOT to store any sensitive data inside JwtToken. Because if user’s password is stored in a JwtToken and a hacker would steal it, they wouldn’t only steal user’s session, but also the credentials.

The token below, contains email address, issued-at and expiration dates, which you can read from the decoded payload on the right:

Jwt Encryption

Also using JwtToken might become a disadvantage if you store a lot of data inside it. Since it’s sent back and forth with every request, it can slow down the communication, whereas with the sessionId you are just sending an Id and looking up the data on the server side, which makes the transfer over the network faster.

Long-lived vs short-lived token

It’s also important to get some wording about the token type straight:

Long-lived (refresh) token is to prove your authentication: you are a valid user. Short-lived (access) token is there to prove your authorization: your valid user has certain access rights.

This means, the long-lived token needs to be refreshed when you change your password, username or log in again, since you will need to re-prove your authentication. Whereas upgrade to premium membership should lead to refreshing short-lived token, since the user now has more access rights and thus the authorization has changed. However, If you have a mechanism in your application that validates your access to premium features without relying on JwtToken, than you won’t have to refresh the token for that particular case.

But generally, you will have to refresh both short and long lived tokens to make sure they are invalidated after some time, so that if someone stole it, they could not use it with the old authentication or authorization data.


You can follow me on Twitter and YouTube.

Latest comments (5)

Collapse
 
shostarsson profile image
RĂ©mi Lavedrine

This is an excellent first view of JWT's tokens and its assets and drawbacks.

I loved the way you presented it.
I was planning to make a video/presentation about hacking/offensive security of JWT tokens and that is a good reading before seeing my (future) video/article. I will point to it. :-)

I'll have a look at you Youtube Channel as well.

Collapse
 
techworld_with_nana profile image
TechWorld with Nana

Thanks RĂšmi appreciate your feedback and pointing to it :)

Collapse
 
artoodeeto profile image
aRtoo

Wow really like this post. Question ma'am, what is the best way to implement authentication? right now, on my personal project Im using jwt. It has user email, username, userId. Every time a user requests, an Authentication header is attached with Bearer <JWToken> schema. Is that enough to secure the api? or do I need to use cookies and jwt?

Collapse
 
martineboh profile image
Martin Eboh

If you’re going to use JWT, be sure to send it to the client only with HttpOnly option enabled for the cookie via HTTPS connection.

Collapse
 
artoodeeto profile image
aRtoo

Hello thank you for the response. I was thinking of that one before but I didnt implement it since i dont send my cookies to my server. so what I did is I have a interceptor using axios then before the request i have to attached a auth header like:

axios.cofig.header.authorization = `Bearer ${cookie('cookie-name')}`