Skip to content

Long lasting user sessions #243

Answered by jmikrut
sixers asked this question in Q&A
Jul 26, 2021 · 1 comments · 3 replies
Discussion options

You must be logged in to vote

@sixers this is a great question! Thanks for opening up this discussion here because I bet this will be of value to a lot of people - and we're going to get a bit theoretical.

You're right that the typical "access / refresh" token is pretty standard. But it never made a whole lot of sense to us - because in web apps, if you store both as an httpOnly cookie, then theoretically if you hijack one, you hijack the other. Meaning... it's not much more secure than a long lasting access token on its own. Even if the access token is expired, an attacker can simply use the refresh token and boom. Get a new access token. Thus, in order for the refresh token to be secure, you need to take even more s…

Replies: 1 comment 3 replies

Comment options

You must be logged in to vote
3 replies
@sixers
Comment options

@jmikrut
Comment options

@sixers
Comment options

Answer selected by denolfe
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants