What is a Token in Computers?
Written by: Lizzie Danielson
Published: 9/12/2025
On This Page
Frequently Asked Questions
Unlike passwords, tokens typically have short lifespans and can be immediately revoked. Most systems automatically refresh tokens regularly, limiting the window of vulnerability.
Tokens aren't necessarily more secure than strong passwords, but they're used differently. They reduce how often sensitive credentials are transmitted and can carry more granular permission information.
Token lifespan varies by use case—some last minutes (like authentication tokens), others persist for hours or days (like API access tokens). Critical systems often use very short-lived tokens for maximum security.
Some tokens (like hardware security tokens) work offline, but most require network connectivity to validate against the issuing system. Offline tokens typically use cryptographic signatures for validation.
Cookies are a storage mechanism that can contain tokens, but tokens are the actual data representing authentication or authorization. Think of cookies as the envelope and tokens as the letter inside.