Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Follow upstream Idp access + refresh token validity #3234

Open
guyguy333 opened this issue Sep 21, 2024 · 1 comment
Open

Follow upstream Idp access + refresh token validity #3234

guyguy333 opened this issue Sep 21, 2024 · 1 comment
Labels
A-Upstream-OAuth Related to login via upstream OAuth 2.0 providers

Comments

@guyguy333
Copy link

guyguy333 commented Sep 21, 2024

Is your feature request related to a problem? Please describe.

Currently, it looks like sessions I'm running with MAS and related to my upstream IdP are infinite lifetimes despited my upstream Idp has relatively short access token and refresh token validity values. They're not following Idp refresh token validity and access token validity.

Describe the solution you'd like

I would expect MAS to follow Idp refresh token validity + access token validity as a end date of session with MAS.
I also expect devices related to MAS to all have a finite lifetime correlated to IdP information.
What would be great, is to have an option to force user to login each time you add a new device or you need to login again to refresh an existing session on a device, so all devices (eg: a desktop and a mobile) are not logout at the same time, ie each device should have its own session lifetime. Otherwise, it would be less user-friendly for user to validate device using another existing session.

Describe alternatives you've considered

None. Maybe a configuration is missing on my side.

Additional context

@sandhose
Copy link
Member

This is a relatively common behaviour with any software which have SSO support through OIDC. I haven't seen any software doing that, instead they usually rely on other mechanisms, like OpenID Connect Backchannel Logout, which is a server-to-server notification of the session ending on the IdP side.

Support for this is tracked in #2090

@sandhose sandhose added the A-Upstream-OAuth Related to login via upstream OAuth 2.0 providers label Oct 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-Upstream-OAuth Related to login via upstream OAuth 2.0 providers
Projects
None yet
Development

No branches or pull requests

2 participants