Use the Token After Login

  1. Every backend service is protected by a common middleware that validates the incoming access token using the Public Key.
  2. For user-related data:
    • Services may perform read-only access to the Users Table directly for performance.
    • Alternatively, they can proxy the request via the Auth Server if direct access is restricted or decoupled.
  3. If the access token has expired (after 15 minutes), the API call will fail with an authentication error.
  4. When this happens, the app uses the refresh token to request a new access token from the Auth Server.