CS Notes

Recent writing

  • VLAN

    Aug 29, 2025

    • networking
  • End-to-End Service Access Troubleshooting

    Aug 29, 2025

    • networking
  • File System Link

    Aug 29, 2025

    • OS
    • bash

See 642 more →

👋🏻 Join My Telegram channel!


I share real-world lessons from building scalable systems at Binance, and running mission-critical cloud ops at GovTech and Singapore Air Force. No fluff, just practical takeaways, hard-earned fixes, and deep dives that matter.

Home

❯

Security

❯

Authentication

❯

Token Based Authentication

Token-Based Authentication

63 words, 1 min read
Last updated on Jan 04, 2024
🌟 Edit This Page!   🗓️ History

  • security
Xinyang YU

Abstract


  • One example is API Key

Benefits


Stateless

  • Address Hard to Scale issue
  • Token-Based Authentication includes a user ID, eliminating the need for the Server to store token information in memory

Cookie Independent

  • Doesn’t rely on Cookie, can work with Local Storage

Cross Platform Support

  • Support both mobile and web platforms natively

Much More Secure

  • Mitigate the XSS Attack & CSRF Attack risks
  • Abstract
  • Benefits
  • Stateless
  • Cookie Independent
  • Cross Platform Support
  • Much More Secure

Mentioned by

  • EC2
  • Token-Based Authentication

Graph View


Created by Xinyang YU | © 2023, 2025 | Licensed under CC BY-NC 4.0

  • GitHub