generally speaking, sessionId has cross-domain security problems, but token does not. My understanding is that
sessionId is afraid of cross-domain problems, while token is not afraid because the former is based on cookie automatic carrying and the latter is carried manually.
when there is a cross-domain attack, the victim clicks the link and automatically brings the sessionId
on the browser cookie. Token is usually manually placed in the parameters or header when the programmer writes ajax in the program, so there is no cross-domain security problem?
if token is also placed in cookie, cross-domain security problems will occur like sessionId.
is that right?
so there should be no security problem if the https://blog.csdn.net/moshowg... zuul gateway is open and cross-domain, right?