JWT
Incomplete or skipped token validation in APIs
9APIs frequently validate only that a token is present rather than performing full server-side validation of signature, issuer, audience, expiry, and required scopes, leaving the system vulnerable to forged or expired tokens.
Authentication Boilerplate & Fragmentation
7Every project requires implementing the same authentication patterns (OAuth, JWT, sessions, MFA, password resets, social login, RBAC), but implementations differ. Auth libraries break between framework versions, self-hosted auth creates security liability, and third-party auth introduces vendor lock-in with per-MAU pricing.
JWT tokens too large to store in cookies
5Developers often attempt to store self-encoded OAuth 2.0 tokens (JWTs) in cookies, but token size can exceed browser cookie limits. Alternative storage methods (memory, splitting) add implementation complexity.
Lack of built-in authentication and authorization mechanisms
5Nginx provides no native authentication or authorization for managing access to microservices, forcing integration with external systems like OAuth 2.0 and JWT. This adds operational complexity and requires additional proxy configuration layers.