-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Token retention policy #4
Comments
the history of authentications must go in the logs not in the database.... too much data is bad data |
Is there a use case that requires to differentiate between different states of a token?
Would we need to know when a token expired and when it was removed? (different timepoints each event took place) I guess the answers rely on the business, in relation to regulations (what would be good-enough for an auditor?) |
I think that can be useful know when an user has renewed a token for an incidents analysys and not for the authentication/authorization process. If it's necessary to check a token I need to validate only the current token, the olders are history |
in the new/update method of the storage we can save/store/archiviate any historical information before (re)write the object. any idea is appreciated |
thinking in a bored time.... if the problem is follow the token's history, we can add the session sid (or an UUID) in the OIDC log with necessary info. With this trick the history is readable / seachable and the DB is not full, |
I agree with @MdreW access tokens that for some reason (revoked/expired/...) are not usable anymore should not be in Whether the pruning is done by the library or by the persistent storage I don't really care. We probably should provide one way of doing it in the library. This could be governed by configuration. |
@MdreW @melanger @c00kiemon5ter @nsklikas
I have to discuss with you about this topic, how satosa-oidcop handles the expired/refreshed token.
At this time the expired will be pruned automatically if a mongo index for doing this is configured
the refreshed token instead will overwrite the old session.
This behaviour was implemented in here:
SATOSA-oidcop/satosa_oidcop/core/storage/mongo.py
Line 107 in 6539a23
as you can see if you refresh a token, using this snippet for example
https://oidcop.readthedocs.io/en/latest/contents/usage.html#refresh-token
the session will be overwritten.
That looks good to me, why I should store an expired access_token?
But I admit that there would be some cases where an organization would store also the history.
I don't know if a general configuration parameter would be a good compromise for this.
what do you think about?
The text was updated successfully, but these errors were encountered: