Problem
It is common practice to extend the time between logins by issuing a new token when presented with an existing token, or to have a separate refresh token that requests a new access token.
There is a concern, as noted in #103, about unauthorized persons gaining extended access to a system if the access token is compromised.
Solution
Using refresh tokens, together with additional safeguards, should make it more difficult for an attacker to gain extended access in this way.
At the moment, this matter needs to be researched more thoroughly before deciding what kind of addition to the library / documentation is needed.
Problem
It is common practice to extend the time between logins by issuing a new token when presented with an existing token, or to have a separate refresh token that requests a new access token.
There is a concern, as noted in #103, about unauthorized persons gaining extended access to a system if the access token is compromised.
Solution
Using refresh tokens, together with additional safeguards, should make it more difficult for an attacker to gain extended access in this way.
At the moment, this matter needs to be researched more thoroughly before deciding what kind of addition to the library / documentation is needed.