You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> That’s why it’s also really important not to store JWT on the client, say via cookies or localstorage. Doing so you make your app vulnerable to CSRF & XSS attacks, by malicious forms or scripts to use or steal your token lying around in cookies or localstorage.
and
What about saving it in a cookie?
Creating cookies on the client to save the JWT will also be prone to XSS. If it can be read on the client from Javascript outside of your app - it can be stolen. You might think an HttpOnly cookie (created by the server instead of the client) will help, but cookies are vulnerable to CSRF attacks.
Part of it is done. Currently, the token now comes via cookie (for SSE) & for normal requests still from the local storage.
Needs more work for the normal requests, but a small part is done.
Also needed: expiry time as response from login / refresh-token so the UI can calculate the refresh time.
cstenglein
added
App:Other
Issues not directly related to the App (e.g. folder organization)
and removed
needs more info
For issues that are not properly refined and need more information
labels
Jun 7, 2023
Store the JWT Token in a httpOnly Cookie and don't save it in session / local storage.
Also needs the API to support this.
The text was updated successfully, but these errors were encountered: