Based on the understanding, Thrymr Team created a Technical Architecture for the User management.
Description | Following points regarding JWT+Redis We can control access to APIs you deploy to API gateways using JSON Web Tokens (JWTs). When a client attempts to access an API, it must include a JWT. The resource validates the JWT with an authorization server using a corresponding public verification key. A token will be active until its set expiration date. The solution is to save a blacklisted token on logout in a column of the user table and use it for validation, destroying the previous token when it expires. | |
Pros and cons |
Advantages Why Redis:
| Disadvantage: Maintaining Redis is only for backend login engineering work not for any business functionality purpose. |
...