Open
Description
A question on security. Whats the motivation for keeping entire tokens in the blacklist apps outstanding/blacklisted token tables?
Wouldn't just keeping track of token jti's be enough?
If the database is somehow leaked an attacker would be able to use the outstanding tokens. If tokens are long-lived this could potentially be an even greater problem.
Or am I missing something?
Thanks for making great software!