-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Closed
Labels
help wantedWe are looking for help on this one.We are looking for help on this one.rfcA request for comments to discuss and share ideas.A request for comments to discuss and share ideas.staleFeedback from one or more authors is required to proceed.Feedback from one or more authors is required to proceed.
Milestone
Description
Is your feature request related to a problem? Please describe.
We want different applications to have different lifespans of the access tokens. This is particularly important in the multi-tenant environments where the customer may have requirements different from our defaults.
Describe the solution you'd like
I think it would be great to have it done this way:
- consent provider could have an optional parameter in the accept consent request allowing to override the default access/refresh token lifespans. This gives the maximum flexibility.
- these override values can be (optional) configuration parameters of the clients, e.g. stored in the database along with other client parameters
- if nothing is provided, then the global default value is used
- (optional) as a safeguard, it would be great to have min/max allowed values for access/refresh token lifespans. If not provided, they could be initialized to the same values as default lifespan. This way a reasonable range could be enforced.
Describe alternatives you've considered
Multiple Hydra deployments - but this creates significant complexity and does not scale beyond 2-3 different tenants.
Additional context
N/A
jimmytheneutrino, leonfancy, andrey-hohlov, Kortivex, tvestelind and 4 more
Metadata
Metadata
Assignees
Labels
help wantedWe are looking for help on this one.We are looking for help on this one.rfcA request for comments to discuss and share ideas.A request for comments to discuss and share ideas.staleFeedback from one or more authors is required to proceed.Feedback from one or more authors is required to proceed.