cookie-session, express-mysql-session, express-session, and koa-session are all Node.js packages designed to manage HTTP sessions, but they differ significantly in architecture, storage strategy, and framework compatibility. express-session is the standard session middleware for Express.js, storing session data server-side by default. cookie-session is an Express-specific alternative that stores the entire session in an encrypted client-side cookie. express-mysql-session is not a standalone session handler but a MySQL store adapter for express-session, enabling persistent session storage in MySQL databases. koa-session serves a similar purpose for Koa.js applications, supporting both client-side cookie storage and optional server-side stores. These packages address different needs around security, scalability, and framework integration in session management.
Managing user sessions is a foundational requirement for web applications that need authentication, personalization, or stateful interactions. The four packages under review โ cookie-session, express-mysql-session, express-session, and koa-session โ all address session handling but differ significantly in architecture, storage strategy, framework compatibility, and security implications. Letโs break down how they work and where each fits best.
cookie-session stores the entire session object directly in the clientโs cookie. This means no server-side storage is needed, but it comes with hard limits on data size (typically <4KB) and requires careful encryption.
// cookie-session: Entire session lives in the cookie
const cookieSession = require('cookie-session');
app.use(cookieSession({
name: 'session',
keys: ['key1', 'key2'], // required for signing
maxAge: 24 * 60 * 60 * 1000 // 24 hours
}));
app.get('/login', (req, res) => {
req.session.user = { id: 123, role: 'admin' }; // stored in cookie
res.send('Logged in');
});
express-session uses a hybrid model: it stores only a session ID in the cookie and keeps the actual session data on the server (in memory by default). This allows larger payloads and better security control.
// express-session: Session ID in cookie, data on server
const session = require('express-session');
app.use(session({
secret: 'keyboard cat',
resave: false,
saveUninitialized: false,
cookie: { secure: true }
}));
app.get('/login', (req, res) => {
req.session.user = { id: 123, preferences: { /* large object */ } };
// Only session ID sent to client; full object stays server-side
res.send('Logged in');
});
express-mysql-session is not a standalone session handler โ itโs a store adapter for express-session that saves session data in a MySQL database instead of memory.
// express-mysql-session: Plug into express-session
const session = require('express-session');
const MySQLStore = require('express-mysql-session')(session);
const mysqlSessionStore = new MySQLStore({
host: 'localhost',
port: 3306,
user: 'dbuser',
password: 'password',
database: 'mydb'
});
app.use(session({
secret: 'secret',
store: mysqlSessionStore,
resave: false,
saveUninitialized: false
}));
koa-session supports both client-side and server-side modes, depending on configuration. By default, it stores sessions in cookies (like cookie-session), but you can provide a custom store for server-side persistence.
// koa-session: Cookie-based by default
const session = require('koa-session');
app.keys = ['some secret'];
app.use(session({
maxAge: 86400000,
signed: true
}, app));
app.use(async ctx => {
if (ctx.path === '/login') {
ctx.session.user = { id: 123 }; // stored in signed cookie
ctx.body = 'Logged in';
}
});
โ ๏ธ Note:
koa-sessiondoes not include built-in support for database stores โ you must implement or integrate a custom store if you need server-side persistence.
This is a hard boundary:
cookie-session, express-session, and express-mysql-session are Express-only. They rely on Express middleware conventions (req, res, next).koa-session is Koa-only. It uses Koaโs context (ctx) and async/await middleware style.You cannot use express-session in a Koa app, nor koa-session in Express. Your choice here is dictated entirely by your web framework.
cookie-session and default koa-session expose all session data to the client. Even when signed, the payload is base64-encoded, not encrypted. Never store sensitive data like passwords, tokens, or PII.express-session (with any store) keeps sensitive data server-side. Only the session ID is exposed โ much safer.express-session provides req.session.regenerate() to rotate session IDs after login, mitigating session fixation attacks.cookie-session has no equivalent โ the session ID is the data, so rotation means overwriting the entire cookie.koa-session supports ctx.session = null followed by reassignment to simulate regeneration, but itโs less explicit.All packages support standard cookie flags (httpOnly, secure, sameSite), but you must configure them explicitly:
// express-session example
app.use(session({
secret: 'secret',
cookie: {
httpOnly: true,
secure: true, // requires HTTPS
sameSite: 'lax'
}
}));
express-session) do not scale across multiple server instances. Sessions vanish on restart and arenโt shared between processes.express-mysql-session solves this for MySQL-backed apps, enabling session sharing across servers and survival through restarts.cookie-session and default koa-session are inherently stateless โ they scale perfectly but sacrifice security and payload size.koa-session with a custom Redis or database store, you regain scalability, but you must write or integrate that logic yourself.cookie-session if:{ userId: 123 }).express-session (with memory store) if:express-mysql-session if:express-sessionโs memory store without switching databases.koa-session if:express-mysql-session cannot be used alone โ itโs an add-on to express-session. You must always pair them.cookie-session in Express, migrate to express-session + a store like express-mysql-session or connect-redis.| Package | Framework | Storage Location | Sensitive Data Safe? | Scalable? | Requires DB? |
|---|---|---|---|---|---|
cookie-session | Express | Client cookie | โ No | โ Yes | โ No |
express-session | Express | Server memory (default) | โ Yes | โ No (single instance) | โ No |
express-mysql-session | Express | MySQL database | โ Yes | โ Yes | โ Yes |
koa-session | Koa | Client cookie (default) | โ No (unless custom store) | โ Yes (cookie mode) | โ No (by default) |
Start by asking two questions:
For Express apps needing robust sessions, the combo of express-session + express-mysql-session (or another store) is the industry standard. For lightweight Koa apps, koa-session in cookie mode works well โ just keep payloads small and non-sensitive. Avoid cookie-session unless you fully accept its security trade-offs.
Choose cookie-session only for simple Express applications where session data is small (<4KB), non-sensitive, and you want to avoid server-side storage entirely. Itโs suitable for prototypes or stateless microservices that can tolerate client-side data exposure, but avoid it if you need to store tokens, PII, or large objects. Remember that all session content is base64-encoded (not encrypted) and visible to users, even when signed.
Choose express-mysql-session when youโre already using MySQL in your Express application and need durable, shared session storage that survives server restarts and scales across multiple instances. Itโs not a standalone package โ you must use it with express-session as a store adapter. This combination is ideal for production Express apps requiring reliable session persistence without migrating to another database like Redis.
Choose express-session as the default session solution for Express applications when you need secure, server-side session storage. Itโs flexible, well-maintained, and supports pluggable stores (like express-mysql-session) for production use. Start with its default in-memory store for development or single-instance deployments, then add a persistent store when scaling. Itโs the most mature and widely adopted option in the Express ecosystem.
Choose koa-session exclusively for Koa.js applications. By default, it stores sessions in client cookies (like cookie-session), making it lightweight and scalable but unsuitable for sensitive data. If you later need server-side persistence, youโll have to implement a custom store, as no official database adapters exist. Itโs a good fit for Koa apps with minimal session requirements or those already handling session logic through other means.
Simple cookie-based session middleware.
A user session can be stored in two main ways with cookies: on the server or on the client. This module stores the session data on the client within a cookie, while a module like express-session stores only a session identifier on the client within a cookie and stores the session data on the server, typically in a database.
The following points can help you choose which to use:
cookie-session does not require any database / resources on the server side,
though the total session data cannot exceed the browser's max cookie size.cookie-session can simplify certain load-balanced scenarios.cookie-session can be used to store a "light" session and include an identifier
to look up a database-backed secondary store to reduce database lookups.NOTE This module does not encrypt the session contents in the cookie, only provides
signing to prevent tampering. The client will be able to read the session data by
examining the cookie's value. Secret data should not be set in req.session without
encrypting it, or use a server-side session instead.
NOTE This module does not prevent session replay, as the expiration set is that
of the cookie only; if that is a concern of your application, you can store an expiration
date in req.session object and validate it on the server, and implement any other logic
to extend the session as your application needs.
This is a Node.js module available through the
npm registry. Installation is done using the
npm install command:
$ npm install cookie-session
var cookieSession = require('cookie-session')
var express = require('express')
var app = express()
app.use(cookieSession({
name: 'session',
keys: [/* secret keys */],
// Cookie Options
maxAge: 24 * 60 * 60 * 1000 // 24 hours
}))
Create a new cookie session middleware with the provided options. This middleware
will attach the property session to req, which provides an object representing
the loaded session. This session is either a new session if no valid session was
provided in the request, or a loaded session from the request.
The middleware will automatically add a Set-Cookie header to the response if the
contents of req.session were altered. Note that no Set-Cookie header will be
in the response (and thus no session created for a specific user) unless there are
contents in the session, so be sure to add something to req.session as soon as
you have identifying information to store for the session.
Cookie session accepts these properties in the options object.
The name of the cookie to set, defaults to session.
The list of keys to use to sign & verify cookie values, or a configured
Keygrip instance. Set cookies are always
signed with keys[0], while the other keys are valid for verification, allowing
for key rotation. If a Keygrip instance is provided, it can be used to
change signature parameters like the algorithm of the signature.
A string which will be used as single key if keys is not provided.
Other options are passed to cookies.get() and cookies.set() allowing you
to control security, domain, path, and signing among other settings.
The options can also contain any of the following (for the full list, see cookies module documentation:
maxAge: a number representing the milliseconds from Date.now() for expiryexpires: a Date object indicating the cookie's expiration date (expires at the end of session by default).path: a string indicating the path of the cookie (/ by default).domain: a string indicating the domain of the cookie (no default).partitioned: a boolean indicating whether to partition the cookie in Chrome for the CHIPS Update (false by default). If this is true, Cookies from embedded sites will be partitioned and only readable from the same top level site from which it was created.priority: a string indicating the cookie priority. This can be set to 'low', 'medium', or 'high'.sameSite: a boolean or string indicating whether the cookie is a "same site" cookie (false by default). This can be set to 'strict', 'lax', 'none', or true (which maps to 'strict').secure: a boolean indicating whether the cookie is only to be sent over HTTPS (false by default for HTTP, true by default for HTTPS). If this is set to true and Node.js is not directly over a TLS connection, be sure to read how to setup Express behind proxies or the cookie may not ever set correctly.httpOnly: a boolean indicating whether the cookie is only to be sent over HTTP(S), and not made available to client JavaScript (true by default).signed: a boolean indicating whether the cookie is to be signed (true by default).overwrite: a boolean indicating whether to overwrite previously set cookies of the same name (true by default).Represents the session for the given request.
Is true if the session has been changed during the request.
Is true if the session is new.
Determine if the session has been populated with data or is empty.
Represents the session options for the current request. These options are a shallow clone of what was provided at middleware construction and can be altered to change cookie setting behavior on a per-request basis.
To destroy a session simply set it to null:
req.session = null
Since the entire contents of the session is kept in a client-side cookie, the
session is "saved" by writing a cookie out in a Set-Cookie response header.
This is done automatically if there has been a change made to the session when
the Node.js response headers are being written to the client and the session
was not destroyed.
var cookieSession = require('cookie-session')
var express = require('express')
var app = express()
app.set('trust proxy', 1) // trust first proxy
app.use(cookieSession({
name: 'session',
keys: ['key1', 'key2']
}))
app.get('/', function (req, res, next) {
// Update views
req.session.views = (req.session.views || 0) + 1
// Write response
res.end(req.session.views + ' views')
})
app.listen(3000)
var cookieSession = require('cookie-session')
var express = require('express')
var app = express()
app.set('trust proxy', 1) // trust first proxy
app.use(cookieSession({
name: 'session',
keys: ['key1', 'key2']
}))
// This allows you to set req.session.maxAge to let certain sessions
// have a different value than the default.
app.use(function (req, res, next) {
req.sessionOptions.maxAge = req.session.maxAge || req.sessionOptions.maxAge
next()
})
// ... your logic here ...
This module does not send a Set-Cookie header if the contents of the session
have not changed. This means that to extend the expiration of a session in the
user's browser (in response to user activity, for example) some kind of
modification to the session needs be made.
var cookieSession = require('cookie-session')
var express = require('express')
var app = express()
app.use(cookieSession({
name: 'session',
keys: ['key1', 'key2']
}))
// Update a value in the cookie so that the set-cookie will be sent.
// Only changes every minute so that it's not sent with every request.
app.use(function (req, res, next) {
req.session.nowInMinutes = Math.floor(Date.now() / 60e3)
next()
})
// ... your logic here ...
This example shows creating a custom Keygrip instance as the keys option
to provide keys and additional signature configuration.
var cookieSession = require('cookie-session')
var express = require('express')
var Keygrip = require('keygrip')
var app = express()
app.use(cookieSession({
name: 'session',
keys: new Keygrip(['key1', 'key2'], 'SHA384', 'base64')
}))
// ... your logic here ...
Because the entire session object is encoded and stored in a cookie, it is possible to exceed the maximum cookie size limits on different browsers. The RFC6265 specification recommends that a browser SHOULD allow
At least 4096 bytes per cookie (as measured by the sum of the length of the cookie's name, value, and attributes)
In practice this limit differs slightly across browsers. See a list of browser limits here. As a rule of thumb don't exceed 4093 bytes per domain.
If your session object is large enough to exceed a browser limit when encoded, in most cases the browser will refuse to store the cookie. This will cause the following requests from the browser to either a) not have any session information or b) use old session information that was small enough to not exceed the cookie limit.
If you find your session object is hitting these limits, it is best to consider if data in your session should be loaded from a database on the server instead of transmitted to/from the browser with every request. Or move to an alternative session strategy