Published on: April 2026
UNDERSTANDING AUTHENTICATION IN MICROSERVICES: COMPARING SESSION-BASED AND JWT
Abhirudh Singh
Article Status
Available Documents
Abstract
This paper compares traditional session-based authentication approach with modern JWT-based authentication for web application. This paper describes the implementation of JWT-based authentication and the security issues related to the storage of JWT. The performance experiment of JWT-based authentication compared to the traditional session-based approach showed promising results: a reduction of 50% in average response time, from 185ms to 92ms.
How to Cite this Paper
Singh, A. (2026). Understanding Authentication in Microservices: Comparing Session-Based and JWT. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.871
Singh, Abhirudh. "Understanding Authentication in Microservices: Comparing Session-Based and JWT." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.871.
Singh, Abhirudh. "Understanding Authentication in Microservices: Comparing Session-Based and JWT." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.871.
References
[1] M. Jones, J. Bradley, and N. Sakimura,”JSON WEB TOKEN(JWT),”RFC 7519,May2015.[2] N.Provos and D. Mazières,”A Future-Adaptable Password Scheme,” USENIX Annual Technical Conference, 1999.
[3] OWASP Foundation, “Session Management Cheat Sheet,” 2023.
[4] OWASP Foundation,”Cross Site Scripting Prevention Cheat Sheet,”2023.
[5] D. Hart, “OAuth 2.0 Security Best Current Practice,” IETF Draft,2012.
[6] T. Lodderstedt et al.,” OAuth 2.0 Security Best Current Practice,” IETF Draft, 2023.
[7] C. Richardson,”Microservices Patterns:With Examples in Java,”Manning Publications,2018.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 28 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

