๐Ÿšซ Why I Hate Sanctum for High-Traffic Applications and How I Overcame It ๐Ÿš€| Scaling - SWE Blogs

Shaon Majumder
5 min readMar 27, 2025

--

๐ŸŽฎ The Pain of Using Sanctum in a High-Traffic Gaming Platform Profile System

When I first built a profile management system for a gaming platform, I opted for Laravel Sanctum for authentication. It seemed like a solid choice โ€” session-based authentication with HTTP-only cookies, built-in security, and seamless integration with Laravel. However, when the platform launched and users started pouring in, things went south fast. ๐Ÿ˜“

๐Ÿšจ The Disaster: Database Overload

Sanctum, by design, validates every request by checking the database for the userโ€™s token. This wasnโ€™t an issue during development or beta testing, but once thousands of gamers started interacting simultaneously, the database got hammered. The system was performing database queries every second just to validate user sessions. The result? ๐Ÿคฏ

  • Increased latency: Each request had to wait for a DB query. โณ
  • Server slowdowns: The shared database (also serving the main site, admin dashboard, and gaming APIs) struggled under the load. ๐Ÿข
  • Frequent crashes: Under peak traffic, DB response times skyrocketed, leading to downtime and frustrated users. ๐Ÿšจ

I had built a system that failed under high load. It was a hard lesson in scalability. ๐Ÿ“‰

๐Ÿง  What I Learned from This Failure

After analyzing the problem, I realized three major flaws in my approach:

  1. Database-bound Authentication: Checking the database for every request created a significant performance bottleneck. โš ๏ธ
  2. Inefficient Token Rotation: Every time a user session extended, the refresh token mechanism triggered unnecessary database writes. โœ๏ธ
  3. Lack of a Caching Strategy: The system wasnโ€™t leveraging in-memory storage like Redis to reduce DB queries. Even with a caching strategy for token rotation and a refresh token for long logged-in sessions, we still faced challenges. The access token was short-lived, meaning frequent refreshes were required, and for every refresh, the system had to check and write to the database. ๐Ÿ”„

I needed a stateless authentication system that wouldnโ€™t bring down the database. Thatโ€™s when I decided to switch to JWT. ๐Ÿ†

๐Ÿ’ก Proposed Solutions

1. Database Optimization & Isolation

  • Separate Database for Gaming Platform: To reduce contention, the gaming profile system should have its own dedicated database. ๐Ÿ—„๏ธ
  • Increase Server Resources: Even with database separation, if hosted on the same server, we need to scale up CPU, memory, and disk I/O to maintain reliability. ๐Ÿ‹๏ธโ€โ™‚๏ธ

2. Implement Efficient Caching Strategy

  • Token Storage in Redis: Instead of querying the database on every request, store access tokens in Redis with a TTL (Time-to-Live) of 1โ€“2 hours. โฑ๏ธ
  • Sliding Expiration: Rather than letting tokens expire all at once, implement a sliding expiration mechanism. This extends the TTL each time the user makes a valid request.
  • Sliding Expiration Demystified:
    Unlike fixed expiration, where a token expires at a set time, sliding expiration extends the TTL each time the user makes a valid request. For example, if a token has a TTL of 30 minutes and the user makes a request at the 20-minute mark, the TTL resets to another 30 minutes from that point. This ensures active users donโ€™t get logged out unexpectedly, while preventing inactive sessions from lingering too long. ๐Ÿ”„
  • Session Stickiness: Maintain the session in memory cache to avoid repetitive database queries. ๐Ÿง 

3. Switch to JWT for Stateless Authentication

  • JWT (JSON Web Token) eliminates the need for database queries by storing all required claims within the token itself. ๐Ÿ”‘
  • It uses a secret key or public-private key pair for validation without the need for a database lookup. ๐Ÿ”
  • Reduces write operations, as no token rotation is required. โ›”
  • Downside: JWTs cannot be easily revoked unless we implement a blocklist in Redis or use a short TTL. โš ๏ธ

4. Redis Token Blocklist for Secure Token Revocation

Since JWTs are stateless, once issued, they remain valid until expiration unless explicitly revoked. A Redis token blocklist solves this problem by tracking revoked tokens. ๐Ÿ›‘

How It Works:

  • When a user logs out or an admin revokes access, their JWT or refresh token is added to a Redis blocklist with a TTL matching its remaining validity. ๐Ÿ”’
  • On each request, the system checks:

โ€” Is the token expired? โ†’ If yes, reject it. โณ

โ€” Is the token in the Redis blocklist? โ†’ If yes, reject it. ๐Ÿšซ

โ€” Otherwise, allow access. โœ…

  • Once the Redis TTL expires, the blocked token is automatically removed. ๐Ÿ—‘๏ธ

Advantages:

  • Fast Performance: Redis is an in-memory data store, making token lookups and revocations extremely fast. โšก
  • Efficient Memory Usage: Tokens expire naturally, and Redis automatically removes them. โ™ป๏ธ
  • Security Improvement: Prevents unauthorized access if a token is compromised. ๐Ÿ”
  • Supports Token Revocation: Unlike standard JWTs, the blocklist provides a mechanism for immediate invalidation. ๐Ÿ”’

๐Ÿ”„ Overcoming the JWT Weakness on Token Revocation

JWTs are stateless, which means once a token is issued, there is no easy way to invalidate it unless it expires. This presents a security challenge โ€” what if a user logs out, or an admin wants to revoke access? The stateless nature of JWTs means that any revoked token would still be valid until expiration. ๐Ÿ˜”

To overcome this weakness, I implemented a Redis token blocklist. This allows the system to store tokens that need to be explicitly revoked.

  • On token revocation: When a user logs out or an admin triggers a revocation, the corresponding JWT or refresh token is added to the Redis blocklist. โŒ
  • On request: Each time a request is made, the system checks the blocklist to see if the token is invalidated. If the token is in the blocklist, access is denied. ๐Ÿšซ
  • Automatic Removal: Once the tokenโ€™s expiration time has passed in the blocklist, Redis automatically removes it, ensuring that storage usage remains efficient. ๐Ÿงน

With this solution, revoked tokens are immediately blocked, ensuring that unauthorized access is prevented. ๐Ÿ”’

๐Ÿ† Hybrid Approach for Best Performance

After extensive testing, I settled on a hybrid solution to achieve the best of both worlds:

JWT for Web & Mobile Clients:

  • No database queries are needed for authentication. ๐ŸŒ
  • Uses HTTP-only cookies for security. ๐Ÿ”
  • Sliding expiration ensures active users stay logged in without sudden expirations. โฑ๏ธ

Redis Cache for Access Tokens:

  • Reduces DB calls while maintaining security. ๐Ÿ›ก๏ธ
  • Prevents mass expiration spikes that could overload the system. โšก

Sanctum for Admin & Dashboard Users:

  • Secure and controlled access where traffic is lower. ๐Ÿ“Š

Device Fingerprinting for Extra Security:

  • Ensures refresh tokens are bound to a specific device, preventing token theft. ๐Ÿ–ฅ๏ธ

๐ŸŒŸ Final Thoughts

Sanctum works great for small applications, but for high-traffic platforms, JWT with Redis caching is the way to go. By removing the database bottleneck, I was able to turn a failing system into a scalable, high-performance authentication solution. โšก

Lesson learned: Donโ€™t rely on a database-driven authentication system for high-traffic applications. Use JWTs and caching instead. ๐Ÿš€

JWT is a game changer โ€” offering a stateless solution that reduces database dependency, enhances performance, and provides a more secure and scalable approach for high-traffic systems. ๐Ÿ”‘๐ŸŒ

#laravel #sanctum #jwt #high-traffic #applications

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Shaon Majumder
Shaon Majumder

Written by Shaon Majumder

Software Engineer | Author | Data Scientist

No responses yet

Write a response