Announcing Redis 7.2 unified release and enhanced vector DB

Announcement blog

Authentication Token Storage

Use Redis Enterprise to provide a responsive, scalable, and resilient login process

The login and authentication process is critically important to an application’s user experience and availability. During the login process, after the user has successfully enters their credentials, an authentication server creates an authentication token for the duration of the user session. Redis Enterprise excels as an authentication token store. Its speed enables significantly better login experiences while ensuring mission-critical applications are always available and scale seamlessly. Why not make a good first impression?

How it works for a mobile banking application

  1. A user enters their credentials.
  2. An IDP system (authentication server) validates the user credentials and generates an authentication token.
  3. That authentication token is stored in Redis Enterprise for the duration of a user session. The app and all its components can consult the token to recognize the user as validated.

How Redis Enterprise solves your challenges

The Authentication ChallengeThe Redis Enterprise Solution
Slow application login and authentication frustrates users and creates a poor first check icon Using Redis for authentication token storage enables applications to provide better login experiences.
Difficulty maintaining login and authentication process during periods of peak check icon Redis Enterprise is extremely scalable, enabling flawless login and authentication experiences even during periods of peak demand.
Excessive reads cause performance penalties and higher infrastructure check icon Redis Enterprise is highly resilient, with 99.999% uptime. You can be confident that that the login process won’t fail, so your apps are always available to users.

Benefits of authentication token storage with Redis Enterprise

  • Sub-millisecond response times to streamline user logins and fast authentication
  • A highly scalable authentication system that ensures seamless user logins, even during times of peak demand
  • High availability and resilience prevent authentication system problems that cause application outages

Related resources


  • What is an authentication token?
    • An authentication token is a digital artifact that represents a user’s identity created by an authentication server after an user has successfully entered their credentials. However, insecure authentication token storage can lead to significant application security vulnerabilities.
  • Where should authentication tokens be stored?
    • The token generated by an authentication server can be stored in a relational or noSQL database, a file-based store, or an in-memory. Disk-based relational or noSQL databases are slow and pose scalability challenges. In-memory stores such as open-source Redis allow fast access and easy management of tokens but do not scale to meet the needs of today’s companies.
  • Why is authentication tokens storage needed?
    • So that applications and their components can quickly and securely identify a user as validated during a user session
  • How long should authentication tokens be stored?
    • Authentication tokens should be stored for the duration of a user session