The use of a header for exchanging the token is fine for most cases, but support for HTTP-Only cookies would be a plus for those seeking higher safety against XSS.
In your class-jwt-auth-public.php, inside the validate_toke() function you could write something like:
I'm interested too in having the jwt stored in a http-only cookie, but beside setting the cookie in /token and checking it for each endpoint, there shouldn't be some protection from CSRF attacks?
The use of a header for exchanging the token is fine for most cases, but support for HTTP-Only cookies would be a plus for those seeking higher safety against XSS. In your class-jwt-auth-public.php, inside the validate_toke() function you could write something like:
where JWT_COOKIE_NAME can be a constant, defined, for example, in wp_config.php