On the problem of one person getting multiple token

A logs in on computer B and gets a token, and then A logs in on computer C to get a token,. Now A has two token. Is there any way to invalidate the previous token? Otherwise, both computers can log in, how does the mainstream approach solve this problem?

Mar.19,2021

the general token storage method is to store it in the cache, such as redis,. OK, according to your business requirements, it is actually the simplest requirement:

  

of course you have to maintain token, in the background, or else?

Menu