ID token security
As with other JWTs, you should follow token usage best practices when using and storing ID tokens.Be sure to validate ID tokens before using the information it contains. You can use a library to help with this task.
Describes how ID Tokens are used in token-based authentication to cache user profile information and provide it to a client application.