Token-Based Authentication Limitations

Note the following limitations for implementing token-based authentication: