Expand description
Token revocation — reject JWTs whose jti claim has been revoked.
After JWT signature verification succeeds, the server checks the token’s
jti (JWT ID) claim against a revocation store. If the jti is present,
the token is rejected with 401.
Two production backends: Redis (recommended) and PostgreSQL (fallback). An in-memory backend is provided for testing and single-instance dev.
Revoked JTIs expire automatically when the JWT’s exp claim passes, keeping
the store bounded.
Structs§
- InMemory
Revocation Store - In-memory revocation store for testing and single-instance dev.
- Token
Revocation Config - Token revocation configuration embedded in the compiled schema.
- Token
Revocation Manager - High-level token revocation manager wrapping a backend store.
Enums§
- Revocation
Error - Revocation store error.
- Token
Rejection - Why a token was rejected.
Traits§
- Revocation
Store - Revocation store abstraction.
Functions§
- revocation_
manager_ from_ schema - Build a
TokenRevocationManagerfrom the compiled schema’ssecurity.token_revocationJSON.