Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable client to handle expired bearer tokens #1248

Open
ryanrdoherty opened this issue Oct 25, 2024 · 0 comments
Open

Enable client to handle expired bearer tokens #1248

ryanrdoherty opened this issue Oct 25, 2024 · 0 comments

Comments

@ryanrdoherty
Copy link
Member

In 2.5 years or if we rotate the bearer token signing keys, bearer tokens will become expired and/or invalid, resulting in widespread 401 Unauthorized responses from our containerized services. In the case of expiration, WDK will issue a new guest token which will replace the expired token, but for key rotation it will return 401 (this API can be changed, of course).

In these cases, the client will need to notice a 401 when already submitting an Authorization cookie, and "log the user out", meaning remove the existing Authorization cookie, then resubmit to any WDK endpoint to get a new guest token. If you'd rather a different logic/API, we can discuss. For consistency, maybe WDK should NOT issue a new guest for an expired token and return 401 like everywhere else.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant