-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC client set expire time for access token as configuration item #41067
Comments
/cc @pedroigor (oidc), @radcortez (config), @sberyozkin (oidc) |
In our case, SF will have an expire setting of an access token of 30 min. But sadly won't return it. |
@argenstijn That should still be fine, JWT token claims will be analyzed if no explicit |
@sberyozkin The other situation i still need to test where a JWT token is given back to me. But waiting for SF team to change the configuration for me. I assume this situation will be handled OK. |
Sadly enough Salesforce won't return an 'expire_at' attribute and i cannot use a SF JWT token because it is not supported for custom REST API within SF. So currently i can use the following solution where the access token can be stored for 5 min (or any time!). It would be nice to configure an expire_at at client side in case the OIDC server does not return an expire_at attribute. `
}` |
@argenstijn It would probably be more like |
@sberyozkin Yes, that would be great. So when would this value be used? |
@argenstijn It would only be considered as a fallback, if the token response has no |
Description
When requesting an access token there might be a chance you won't receive an 'expire_at' attribute in the response. This is not mandatory by the spec. For example, Salesforce does not return it. In this case the oidc client (correct me if i am wrong) will cache the access token forever until you revoke it.
It seems to me it would be nice if we could add a configuration which set the max expire time for a token. This value will be used only when the server does not provide it in the response.
Or is there already a better way?
Implementation ideas
See description
The text was updated successfully, but these errors were encountered: