Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make quarkus-oidc's OidcProviderClient available to the custom code #44157

Closed
sberyozkin opened this issue Oct 29, 2024 · 1 comment · Fixed by #44993
Closed

Make quarkus-oidc's OidcProviderClient available to the custom code #44157

sberyozkin opened this issue Oct 29, 2024 · 1 comment · Fixed by #44993
Assignees
Labels
area/oidc kind/enhancement New feature or request
Milestone

Comments

@sberyozkin
Copy link
Member

sberyozkin commented Oct 29, 2024

Description

There have been a couple of requests from users related to the current session's tokens having to be revoked, for example, when the user logs out, I believe Apple requires it in some contexts, and it may be required in other deployments.

Right now, users are on their own on how to do it, for simple cases, an HTTP client form call might do, but it can be messy and should be avoidable.

CC @sschellh @FroMage

Implementation ideas

Add OidcProviderClient#revokeToken, make OidcProviderClient a CDI bean

@sberyozkin sberyozkin added the kind/enhancement New feature or request label Oct 29, 2024
Copy link

quarkus-bot bot commented Oct 29, 2024

/cc @pedroigor (oidc)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/oidc kind/enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant