JWT:
Any customer who has the opportunity to request things (similar to money when buying).- No access to the database after issuing - the built-in validity period dictates verification
JWT has an expiration date and until that time it will remain in force. This may be undesirable if you need to log the user to the reset password or force it.
To eliminate the above problems, a token-blacklist can be used. This will result in the re-implementation of persistent or inline tracking, which the JWT was trying to avoid in the first place. However, snooping will only be on selected keys, while Basic Token Auth snooping is done for all users.
JWT can be decrypted by anyone who has it. Therefore, you need to remember the information packed in the token. The main Auth token, on the other hand, is a simple hash that can be thought of as just a link to the user.
When using caching and other performance improvements, you may not need to worry about overhead, but the convenience and future flow check.
Fully controlling authentication, authorization, and invalidity is good, regardless of whether JWT + is using a blacklist or Basic Token Auth.
Therefore, the main authentication token may be better if the flow is configured to meet needs.
un33k Dec 07 '16 at 16:53 2016-12-07 16:53
source share