Key Features:

  • Users Register
  • Users login
  • Users sign-out

To consider:

  • Security
  • User count

Initial Problem:

HTTP is stateless, but login is stateful (not having to login on every request). Key question is how do we make HTTP requests stateful?

We can add user field to requests to represent which user is interacting with API POST /login { user: “bob”, pass: “lol”}

Now how the problem arises of how can we differentiate between requests from bad actors that claim that they are {user: “bob”}

Identifying State

Session Token are hashed strings used to identify who is interacting with the server. The tokens are generated on login and stored server side on a key value table of users : session token.

Example:

UserSession
Bobxifsop9
Alicefew8nce
Bobewijpw0

Storing Sessions

Now that we have session tokens generated, we need to figure out how can we store them on the client.

Two types: Cookie Based or Local Storage

Security Flaws:

  • [XSS]
  • [CSRF]
Local Storage

Need users to make deliberate requests

Architectural Considerations

Session tokens require a DB hit. Concerns:

  • DoS attack
  • DB scale

Typically the solution is to decentralize

an idea is to use JSON Web Tokens (JWTs)

JSON Web Tokens (JWTs)

JWTs are structured as {header, payload, signature} where:

  • header algorithm + type of token (JWT)
  • payload app data (user data)
  • signature algorithm(header + data, secret) The signature is use the algorithm to verify the data.

Considerations:

  • Uses JWT to verify identity, doesn’t have a central state of truth as with the sessions table.