-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate JWT vs Session IDs for Authentication #170
Comments
This is really just a brain-dump of some of my current thoughts on this. Apologies for it's rambling nature. The implications of using session IDs -vs- signed tokens are truely manifold:
Tokens cop a lot of flack but I think they can make sense in both:
It would be nice to give app developers options. If we wanted to include a token-based session implementation we might still want to avoid JWT though. Much simpler and focused, albeit less common, token standards exists. The main contenders are:
For session IDs we should probably lean heavily towards just using Redis everywhere (inc. in dev). |
Related: Allow setting the session store, #362. |
@jesstelford is this now possible to implement with a custom session store? |
No, it's fundamentally a different model and not supported with custom session stores unfortunately. |
Should this be a session adapter which can make sure consistency in behavior when using jwt or session id? |
Keystone Next will continue to use tokens. |
See Session Authentication vs Token Authentication for more details.
tl;dr:
Our current implementation is Session IDs.
See also #169
The text was updated successfully, but these errors were encountered: