rp
06/19/2020, 5:42 PMSun Walker
07/18/2020, 9:51 AMnext tokens
. And works like this:
- User logs in
- generates Access token (expires after time (1hr), unlimited use)
- generates Next token (unlimited expiry, single use)
- Both are stored in local/async storage OR in cookies
- User uses app/site, via access token and access token then expires
- To get new access token the user must send Access Token AND Next Token to specific endpoint eg /next
- Endpoint checks criteria:
- Does Access Token match the issued one time use Next Token?
- Has access token fully expired?
- Has Next Token been used before?
- If it passes all 3 then a new Access Token and Next Token are generated
- If it fails check number 3 (next used before) it will send a hacking alert
How does this all sound?rp
07/18/2020, 9:54 AMSun Walker
07/18/2020, 9:56 AMkey
and Next token can be the value
in redisSun Walker
07/18/2020, 9:57 AMSun Walker
07/18/2020, 9:57 AMrp
07/18/2020, 9:58 AMSun Walker
07/18/2020, 10:00 AM/next
you generate new token pair. U only use next token
once and if you generate new pair, and then someone else tries to generate new pair before the issued pair access token expires then you know that user is being hackedrp
07/18/2020, 10:02 AMSun Walker
07/18/2020, 10:03 AMrp
07/18/2020, 10:03 AMSun Walker
07/18/2020, 10:03 AMrp
07/18/2020, 10:03 AMSun Walker
07/18/2020, 10:04 AMrp
07/18/2020, 10:04 AMSpl0it
11/10/2020, 4:28 PMSpl0it
11/10/2020, 4:28 PMrp
11/10/2020, 4:29 PMrp
11/10/2020, 4:32 PMSpl0it
11/10/2020, 4:33 PMrp
11/10/2020, 4:34 PMSpl0it
11/10/2020, 4:34 PMrp
11/10/2020, 4:34 PMuser
12/25/2020, 8:21 AMuser
12/25/2020, 8:22 AMrp
12/25/2020, 8:22 AMrp
12/25/2020, 8:22 AMrp
12/25/2020, 8:22 AMuser
12/25/2020, 8:23 AMuser
12/25/2020, 8:24 AM