-
Hi, thank you for sharing this repo, I have to migrate my old spring oauth2 dependencies mechanism and it was a great example to follow to set up a BFF architecture. I'm working on the logout right now and while there is no more curent user returned by the security context, the cookies are still present in the following request after the logout, calling my resource server with those cookies still return datas, I can see the corresponding jwt tokens are still authenticated. I have the same OidcClientInitiatedServerLogoutSuccessHandler used in the http.logout of the BFF, the authorization server is the spring one but its a http.oidc with default configuration and I can see the end_session_endpoint. So I'm wondering what I should expect from logout and how I can clear the cookies and revoke the tokens. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
You cannot revoke JWTs which always are read-only, but it's ok as long as this JWTs are given only to actors that you can trust to be "stateless" (like your resource servers), or actors which you can trust to delete tokens when they end a user session (like your BFF and authorization server) . What you should do is terminate the user session at two places:
By setting the What can go wrong in your case is:
As you are writing only about What you should check:
|
Beta Was this translation helpful? Give feedback.
-
What is your authorization server? What |
Beta Was this translation helpful? Give feedback.
You cannot revoke JWTs which always are read-only, but it's ok as long as this JWTs are given only to actors that you can trust to be "stateless" (like your resource servers), or actors which you can trust to delete tokens when they end a user session (like your BFF and authorization server) .
What you should do is terminate the user session at two places:
oauth2Login
(the BFF)By setting the
OidcClientInitiatedServerLogoutSuccessHandler
, you're asking the BFF to create the URI to l…