Replies: 6 comments 4 replies
-
it appears indeed that it is not working as documented; the only thing you can do is to set the depending on what you're trying to do with the access token, it may be better to issue longer lived access tokens and/or not use |
Beta Was this translation helpful? Give feedback.
-
We are re-considering our approach wrt. parallel token refresh grant handling: would you be able to test from a branch or could you so so with a build provided by us? |
Beta Was this translation helpful? Give feedback.
-
Hi, Note : your approach of generating errors by disabling the parallel calls capability cannot be implemented on my side (too much impact). |
Beta Was this translation helpful? Give feedback.
-
Hi,
This morning's tests which are OK. Thanks
I use the access token to In addition, the access token is used by the application to query other APIs on behalf of the user (OIDC scopes allowing all user rights for all applications of the necessary perimeter) |
Beta Was this translation helpful? Give feedback.
-
Hi, Please note that I am in cjose version cjose-0.6.1.5-1
|
Beta Was this translation helpful? Give feedback.
-
Hi, Do you have an estimated date for the release of the new version correcting the above anomaly? |
Beta Was this translation helpful? Give feedback.
-
Hi,
In the wiki documentation you talk about management by lock system of parallel requests for tokens by the refresh token.
Today, I'm working on a single Apache instance which is connected to a keycloak IDP. The keycloak is configured to accept the use of a refresh token once (Revoke Refresh Token active and the value of Refresh Token Max Reuse at 0)
At my level, I cannot demonstrate the correct functioning of the locks.
My example is the following:
4 simultaneous calls to resources under “AuthType openid-connect” protection
Any subsequent refresh token calls are KO because, in my opinion, the cache of the Apache instance could not be refreshed with the new refresh token.
note: as a reminder that in the continuous refresh token situation, keycloak provides a new refresh token for each request
The only possibility I have, to date, is to configure my keycloak instance to accept the use of 8 refresh tokens. This configuration in terms of security is a global configuration at the level of the keycloak kingdom and which therefore opens up security risks in the event of interception.
Do you have any ideas to share with me to validate the expected operation?
My conf :
Beta Was this translation helpful? Give feedback.
All reactions