DEV Community

Cover image for What is really the difference between Cookie, Session and Tokens that nobody is talking about ?.

What is really the difference between Cookie, Session and Tokens that nobody is talking about ?.

nshimiye_emmy on May 01, 2021

To understand the difference between cookies, sessions and tokens we need to get back on the basics. Let's say you want to login to your bank accou...
Collapse
 
andreidascalu profile image
Andrei Dascalu

"So the server will store the session information in the database " - what database? Session (even when they exist at all) depend on server side implementations. I haven't heard of one that uses a database by default. Most go to temporary files or in-memory. None that I work with are even able to use a database without third party libraries, at most there's a native option for a k/v store. I would stay away from anything that stores session data to dB.

Collapse
 
jaguart profile image
Jeff

I've used MySQL to store user sessions in a small scale system - about 300 simultaneous users. The reason being that with reasonable cache and the use of MyISAM tables, you have lightning fast structured storage of large collections of session data for each user, stored in memory but accessible using a structured query language. I usually store the session details in multi-record format, never as blobs.
It makes it easier to construct tools for your system admins to see exactly what each user is doing in real-time, and even for your admins to assume and safely change the session of a logged in user for accurate real-time support.

Collapse
 
ssimontis profile image
Scott Simontis

ASP.NET's legacy Forms Authentication used to allow using a SQL Server database for session storage, but I believe ASP.NET Core favors in-memory engines, although you are technically free to implement whatever you want if you implement the proper interfaces. For example, using Redis or memcached as a session store provider would alleviate the need for sticky sessions on a load balancer.

Collapse
 
rendlerdenis profile image
Denis Rendler

Actually lots of languages and specially frameworks offer support for storing the session data in databases. Now there might be a bit of a difference in the way we define a database, but from my perspective even Redis is a db since it allows storing the data long term on disk. I guess the session being stored in dbs is more common in SOA world where you could have several instances of a service being deployed. So, in this case you can either share the session or tag the user to always direct him to the correct instance.

Collapse
 
jcubic profile image
Jakub T. Jankiewicz • Edited

If you want sessions that are written without cookies you need your own solution for sessions, You can use a database for that. I think that most session solutions use cookies by default.

Collapse
 
andreidascalu profile image
Andrei Dascalu

Not sure you can have sessions without cookies. Session data is not stored in cookies. Only session identification is passed by cookies. Server side defaults to tmp file stored and configurable to k/v stores.

Thread Thread
 
jcubic profile image
Jakub T. Jankiewicz • Edited

Yes, you can. You can keep the token in memory or LocalStorage and send it with every request. I'm using something like this with JSON-RPC where the token is the first argument to remote procedure. But as I've said you will need to have your own session mechanism because most default sessions use cookies. And for that you can use the database, of course, you can also use files or both (SQLite that is both file and database).

Thread Thread
 
andreidascalu profile image
Andrei Dascalu

No, you're talking about a totally different things. Sessions are a concept proper to web servers, where some information related to user activity can be stored server side (in files or k/v stores) and are identified by a web server generated ID. That ID, by default navigates in cookies OR GET parameter (by default SESSION_ID=xxx). That's how sessions work. Some people try to use tokens as session storage in itself, but that in itself is a custom implementation. Using tokens to store session data is wrong. You can use tokens to store session id's, but that's fairly pointless. Tokens are used to store authentication (and authorization, stometimes) to authenticate requests (not to store session data). The issue I was talking about is server side data storage, the kind of that that you can't & shouldn't store client side.
Also, in memory storage is really bad, it's vulnerable to lots of attacks. LocalStorage is also bad (mostly it's also limited so you can't really store the kind of information sessions need) and vulnerable mostly to XSS. Secure cookies are best for storing tokens (though not as a means of communication, you write to cookie, then read to send separately while the server expects the token in dedicated headers and ignores the cookie data).

Thread Thread
 
jcubic profile image
Jakub T. Jankiewicz

I think you don't u understand what I just wrote and keep changing the subject. First, you said that you can't use the database which is not true because you can use it for the session if you create your own mechanism.

Then you're contradicting yourself because first, you said that you can't have a session without cookies, and then next you said that you can use the GET parameter for the session_ID.

My comment only meant that you can create the session with a database and without cookies. You don't need to rely on whatever the platform gives you.

Thread Thread
 
andreidascalu profile image
Andrei Dascalu

No man, what I'm talking about is the context of the OP: cookies vs sessions vs tokens, used as means of exchanging information that stores information about user activity. These terms were used under their proper definition (including session, as a server-provided ephemeral storage).
Yeah, sure, you can create your custom system, you can create your custom anything but what I was talking is what you can use to integrate within the sever provided framework (which already manages how clients are identified and whatnot). That's way beyond the topic of using what's provided. My point was merely to correct a statement in the OP which implied that databases are somehow part of the session mechanism (they're not). The session mechanism as per OP is what the server provides you. You could create your own, but that's not the same thing.
Also, the mere fact that something exists doesn't mean it's usable (session id in URL is as exposed as you can get) so I wouldn't consider as something that's in your toolbox.

Thread Thread
 
kevinmduffey profile image
Kevin Duffey

Andrei is correct.. Jakub seems to miss Andrei's point.

Collapse
 
dev_emmy profile image
nshimiye_emmy

Yeah, I think that's the reason as to why cookie-based authentication is not that much used nowadays. Most applications use token based authentication

Collapse
 
andreidascalu profile image
Andrei Dascalu

Not sure that's the real alternative. Sessions need to be stored somewhere server side (while tokens don't) but token are also stored in cookies (just not sent via cookies)
Client side it's the same type of problem. You need to store the session Id or the token somewhere on the client before it's sent back to server, preferably in a way that's protected against xss and csrf.

Thread Thread
 
dev_emmy profile image
nshimiye_emmy

yeah sure.

Collapse
 
incrementis profile image
Akin C.

Hello nshimiye_emmy,

thank you for your article.
It helped me understand Token a bit better.
This part helped me the most:

"[...]if you click yes the app will receive a token granting access to your transactions but the app will only view transactions, it will not be able to wire transfers or to see other details which you would normally be able to see when you login in your bank account. "

Still, I understand that in a bad situation the app will tell you, it will only read transactions, but the truth is, it could request a token that offers more than just reading options without you knowing, right? Wouldn't it be wiser to tell the bank what token the app can use? I apologize in advance if I get anything wrong here :)!

Collapse
 
dev_emmy profile image
nshimiye_emmy

The bank is the one responsible for giving the token to another app, so it really knows what king of access granting it should give to a third-party website or app.

Collapse
 
kevinmduffey profile image
Kevin Duffey

I'd like to add to.. or perhaps amend Nico's statement a bit about Tokens... while technically correct.. tokens keep the state (as much as the server implementation puts in it).. the client should ideally NOT have access to decode/use the token itself. The server should only send the token on specific path (like /login /token, /refresh, etc) and should be httpOnly and secure.. so that the JS code in a client can not access or decode the token. You might ask.. then how the heck is the client app supposed to get at the details to say.. display the name, email, etc? Well.. when the request to login is made.. which returns the generated token at that point.. it would also return a response body with JSON (for example) that contains the bits the client would use in say the UI. Some might say.. well this is insecure.. but think about it (if you are one of those that think this is the case).. accessing and decoding the token in the client is even less secure and the result is the same (and even more) data. So.. the way a server should use JWT tokens.. is to store things like useId (or the user of that session), and other pieces of data that allow the server side (upon receiving future requests WITH the token) to decode the token, pull the values out and use them in some manner than negates the need to do a DB lookup on every request. Say.. to do a DB query that needs the userId (which is likely a column in several tables in order to tie things to that user). This ultimately keeps the server side largely stateless.. and avoids the client side from accessing secure things like userId.. which should never be allowed to be accessed by consumer UNLESS the system is built that way.. which is as far as I have understood..bad design. If anything, make use of UUIDs as secondary IDs that can be changed/migrated/etc without affecting the actual DB structure.
Their are of course many ways this can be modified to do more or less the same thing.. but just wanted to put it out their that ideally the JWT token should NOT be decoded by the client.. and should NOT be stored in local storage. It should be httpOnly flag, secure flag and only as a cookie.. so for browsers and many nodejs/js libraries.. automatically sent on every request (or those that match the path the token is issued for).

Collapse
 
jcubic profile image
Jakub T. Jankiewicz

I'm not sure if you're aware but SESSION_ID is a form of a TOKEN. Unless you talk specifically about JWT. See Wikipedia it even have session token redirect to Session_ID en.wikipedia.org/wiki/Token

Collapse
 
jcubic profile image
Jakub T. Jankiewicz • Edited

"SESSION STORED IN A COOKIE" session is never stored in the cookie and there is more to tokens than JWT. The token can be an identifier that is saved in a cookie that matches the session on the server. So you can have all your cases as one case.

Collapse
 
dev_emmy profile image
nshimiye_emmy

I did not say that "SESSION STORED IN A COOKIE" instead if you read well I said "Session data is stored on the server side, but a seession_id is stored on client side in a cookie. It allows the server to match a given user with the right session data""

Collapse
 
jcubic profile image
Jakub T. Jankiewicz

Please read it again, this is the section title copy/paste from the article I didn't wrote this down:

SO YOU ARE PROBABLY WONDERING WHAT IS THE DIFFERENCE BETWEEN A TOKEN AND A SESSION STORED IN A COOKIE

Thread Thread
 
dev_emmy profile image
nshimiye_emmy • Edited

ohhh sorry about that, updated. thx

Collapse
 
panen138 profile image
Panen138
Collapse
 
lazerg profile image
Lazizbek Ergashev

Great article

Collapse
 
dev_emmy profile image
nshimiye_emmy

thanks

Collapse
 
m_ahmad profile image
Muhammad Ahmad

Very well explained.

Collapse
 
dev_emmy profile image
nshimiye_emmy

thx, I appreciate

Collapse
 
ayushhdwi profile image
Ayush Dwivedi

Thanks for the artical, it was really helpful and wonderfully explained !!

Collapse
 
dev_emmy profile image
nshimiye_emmy

thank you so much! I really appreciate that.

Collapse
 
bruce_taotao profile image
bruce_taotao

Usefully~

 
andreidascalu profile image
Andrei Dascalu

well, like I said, it's up to how you design your application and what concerns you have there. Suffice to say it can be nice to have, but it's not a universal requirement, not by a longshot.

Thread Thread
 
dev_emmy profile image
nshimiye_emmy

yeah, it all depends on how you want to design your application

 
dev_emmy profile image
nshimiye_emmy

exactly!!

Thread Thread
 
andreidascalu profile image
Andrei Dascalu

Not necessarily, since tokens expires. You can, if you want to, but you don't have to. Tokens should have short lifespans like a few minutes and extend their lives through refresh. You don't need to revoke a token for a few minutes, just flag the account to temporarily deny renewal.

Collapse
 
labn36 profile image
Rishabh Agrawal

thanks for clarity @dev_emmy