Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1020

Session Token

What is Session Token?

Session TokenOpaque identifier issued after authentication that the client returns with each request, letting the server look up the user's session state.


A session token is the credential that keeps a user logged in across HTTP requests. Most commonly it is a cryptographically random string stored on the server side (in a database, cache, or signed cookie) and sent to the browser as a cookie marked Secure, HttpOnly, and SameSite. The server uses it as a key into session storage holding the user ID, roles, and metadata. Strong session tokens have high entropy, are regenerated on login and privilege change, have idle and absolute timeouts, and are invalidated server-side at logout. Common attacks include session fixation, session hijacking, predictable IDs, and missing logout.

Examples

  1. 01

    Set-Cookie: SESSIONID=Z6r...; Secure; HttpOnly; SameSite=Lax

  2. 02

    Regenerating the session ID immediately after a successful login to prevent fixation.

Frequently asked questions

What is Session Token?

Opaque identifier issued after authentication that the client returns with each request, letting the server look up the user's session state. It belongs to the Identity & Access category of cybersecurity.

What does Session Token mean?

Opaque identifier issued after authentication that the client returns with each request, letting the server look up the user's session state.

How does Session Token work?

A session token is the credential that keeps a user logged in across HTTP requests. Most commonly it is a cryptographically random string stored on the server side (in a database, cache, or signed cookie) and sent to the browser as a cookie marked Secure, HttpOnly, and SameSite. The server uses it as a key into session storage holding the user ID, roles, and metadata. Strong session tokens have high entropy, are regenerated on login and privilege change, have idle and absolute timeouts, and are invalidated server-side at logout. Common attacks include session fixation, session hijacking, predictable IDs, and missing logout.

How do you defend against Session Token?

Defences for Session Token typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also