Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OIDC Introspection and Userinfo Cache #12800

Closed
JohZed opened this issue Oct 19, 2020 · 2 comments · Fixed by #20209
Closed

OIDC Introspection and Userinfo Cache #12800

JohZed opened this issue Oct 19, 2020 · 2 comments · Fixed by #20209
Assignees
Labels
area/oidc kind/enhancement New feature or request
Milestone

Comments

@JohZed
Copy link

JohZed commented Oct 19, 2020

Description
(see also discussions on #4481)

Currently, opaque OIDC access tokens need to invoke the token introspection and userinfo endpoint for each request.

An improvement would be the addition of a token introspection/userinfo cache. The cache should be configurable with a cache expiration. Applications would first check the token by invoking cache if not found it would invoke the token introspection/userinfo endpoint.

@JohZed JohZed added the kind/enhancement New feature or request label Oct 19, 2020
@missourian55
Copy link

We have similar requirements, in our organizations its a mandatory requirement to cache the userinfo for certain duration. It would be nice if Quarkus supports token introspection (OAuth2/OIDC) with a caching feature.

@sberyozkin sberyozkin self-assigned this Aug 18, 2021
@sberyozkin sberyozkin added this to the 2.3 - main milestone Aug 18, 2021
@sberyozkin
Copy link
Member

Looking into this issue now

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/oidc kind/enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants