I am using HS256 algorithm for jwt authentication after a user logs in.
So on a successful login, I am sending back the jwt & the client is expected to send the jwt to me now on which is how I validate the client.
Now, since HS256 uses a shared key, I am sharing the key with the client & therefore I thought it might be a good idea to use random uuid keys every time the user logs in. My question is that, does the server store these generated signing keys (for as long as they are valid)? If that's the case, then, as many times a user logs in, it would have to store the signing key that was generated (for as long as they are valid), right?