Each article I read, vouching for the benefits of JWT, claims that one of the benefits is the ability of an auth server to be distributed across multiple servers. those. You do not rely on a central repository of user data to search for each query.
However, when it comes to implementation, I read in many places that for added security you should not just rely on JWT signature verification and that you should maintain a list of black or white list tokens generated by the server.
Does this advantage win above, since this list of tokens needs to be stored centrally, where all servers can access it, and this will require a search for each request?
How did people realize this from their end?
source
share