Implementing Secure Authentication and Token Management

In this meeting, the State Changers discuss the implementation of security measures, specifically regarding the storage of authentication tokens. They debate whether it's appropriate to store an auth token on a table or if there are other better options. One participant suggests using a refresh token pattern, where a short-duration token is used and then refreshed with a new access token as its time is coming up. Another alternative suggested is using a database-based authentication approach, where the auth token is created as a string and stored in the database. This would require creating a custom function for authentication. The participants discuss the trade-offs and advantages of each approach. They also briefly touch on other issues related to user experiences.

(Source: Office Hours 6/19 )

State Change Members Can View The Video Here

View This Video Now

Join State Change Risk-Free