web foundation
Atlassian
GitHub
Stripe

Atlassian Web App Flow: Authentication & Session Management

Topics:
Form Submission
Session Handling
Authentication Flow
Roles:
Software Engineer
Frontend Engineer
Backend Engineer
Experience:
Entry Level
Mid Level
Senior

Question Description

Core content

You will be asked to describe the end-to-end user authentication flow in a web application, from a user filling a login form to receiving secure access. Walk through client-side form submission, the HTTP request/response cycle, server-side credential validation, and how the server issues and manages session identifiers or tokens. Explain how cookies, session stores, JWTs, and refresh tokens are used and when each is appropriate.

High-level flow / stages

  • User action: form submission (validate client-side inputs and handle errors)
  • Transport: POST over HTTPS, headers (Content-Type, CSRF token)
  • Server: authenticate credentials, perform rate limiting, and create a session or sign a token
  • Response: set secure cookie or return token; redirect or return success
  • Subsequent requests: verify cookie/session or validate token and enforce authorization
  • Logout / expiration / revocation: invalidate session, rotate tokens, or blacklist refresh tokens

Skill signals

You should demonstrate knowledge of session handling vs. token-based auth, secure cookie attributes (HttpOnly, Secure, SameSite), CSRF protection patterns, and common vulnerabilities (XSS, SQL injection, session hijacking) with concrete mitigations: input validation, parameterized queries, CSP, secure cookie flags, token rotation, and short-lived access tokens. Be ready to compare server-side sessions and stateless JWTs, discuss refresh-token flow and revocation strategies, and outline how you’d design password reset and third-party (OAuth) flows.

Using these points, you can map a clear, secure authentication flow and justify architecture choices during an Atlassian interview.

Common Follow-up Questions

  • Compare session-based authentication vs. JWT token-based auth: trade-offs, scalability, and when to use each
  • How would you implement a secure refresh-token flow with revocation and rotation?
  • Describe defenses against CSRF and XSS specifically in the login and session lifecycle
  • How would you design a password reset flow to minimize risk of account takeover?

Related Questions

1Design a login rate limiter to prevent brute-force attacks
2Explain how OAuth2 / OpenID Connect login integrates into your authentication flow
3Which cookie attributes and HTTP headers should you set to harden session cookies?
4Design a passwordless authentication flow using magic links and its security trade-offs

Explore More Questions

Practice This Question with AI

Get real-time hints, detailed requirements, and insightful analysis of the question.

Web App Authentication Flow - Atlassian Interview Question | Voker