Answer the question
In order to leave comments, you need to log in
How to protect yourself from the fact that an attacker steals a refresh token?
Refresh token is stored in http only cookie. I saw a recommendation to store the refresh token in the database and compare it for equivalence with the token stored in the cookie, but in this case, what if the user, being authorized on one device, logs in on another?
Answer the question
In order to leave comments, you need to log in
Refresh token binding to :
1. fingerprint (device id; + refresh token binding)
2. IP/Subnet (+ refresh token binding)
3. Behavioral factor control
what to do if the user, being authorized on one device, logs in on another?I already answered here and I will repeat:
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question