Sept. 3, 2023, 3:24 a.m. | Neil Chen

DEV Community dev.to




The Security Implications of Token-Based Authorization


Token-based authentication employs a token to access backend services. However, the more frequently a token is used, the higher the risk of it being compromised. To improve security, a prevalent approach is using a "refresh token". Instead of relying on a single token to access the API throughout a session, two distinct tokens are used.





Understanding Access and Refresh Tokens


Post the login phase, users are provided with two tokens: the Access Token and …

access api authentication authorization automatic backend compromised experience higher refresh token risk security services single token user experience

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Product Delivery Associate - Cybersecurity | CyberOps

@ JPMorgan Chase & Co. | NY, United States

Security Ops Infrastructure Engineer (Remote US):

@ RingCentral | Remote, USA

SOC Analyst-1

@ NTT DATA | Bengaluru, India