-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenId Connect integration #147
Conversation
4e76e13
to
9fee48e
Compare
I see caching for the Auth-Tokens: is it checked to revoke the tokens if the user changes his password or perform a logout on the central SSO? |
Those are tokens not issued for a user but to the application itself (sometimes its called service account authentication). There is no user involved who can change their password. |
I haven't looked into it, but i quit often see that a logout on the central SSO platform or a password change there does not invalidate active sessions in the applications that have an ongoing session for the user. This leads to the problem if the User has the password stolen and the attacker was authenticated he can not invalidate existing sessions. |
As Finn said, the caching here is only about bitpoll's token required to request the users in a group. However, your point about SSO login is probably still valid. @ftsell do you know how we handle that or if we should change something in the |
Hmm good question 🤔
|
7cd83e5
to
bd25c88
Compare
No description provided.