Skip to content

Latest commit

 

History

History
44 lines (34 loc) · 1.65 KB

expirejwt.french.md

File metadata and controls

44 lines (34 loc) · 1.65 KB

Support blacklisting JWTs

One Paragraph Explainer

By design, JWTs (JSON Web Tokens) are completely stateless, so once a valid token is signed by an issuer, the token may be verified as authentic by the application. The problem this leads to is the security concern where a leaked token could still be used and unable to be revoked, due to the signature remaining valid as long as the signature provided by the issues matches what the application is expecting. Due to this, when using JWT authentication, an application should manage a blacklist of expired or revoked tokens to retain user's security in the case a token needs to be revoked.

express-jwt-blacklist example

An example of running express-jwt-blacklist on a Node.js project using the express-jwt. Note that it is important to not use the default store settings (in-memory) cache of express-jwt-blacklist, but to use an external store such as Redis to revoke tokens across many Node.js processes.

const jwt = require('express-jwt');
const blacklist = require('express-jwt-blacklist');

blacklist.configure({
  tokenId: 'jti',
  strict: true,
  store: {
    type: 'memcached',
    host: '127.0.0.1',
    port: 11211,
    keyPrefix: 'mywebapp:',
    options: {
      timeout: 1000
    }
  }
});

app.use(jwt({
  secret: 'my-secret',
  isRevoked: blacklist.isRevoked
}));

app.get('/logout', (req, res) => {
  blacklist.revoke(req.user)
  res.sendStatus(200);
});

What other bloggers say

From the blog by Marc Busqué:

...add a revocation layer on top of JWT, even if it implies losing its stateless nature.