Details
-
New Feature
-
Status: Closed (View Workflow)
-
P3
-
Resolution: Done
-
None
-
-
CP: R3 2022 roadmap
-
2
-
Core: Platform
Description
While long lived access tokens may be convenient for early development, we really need to implement refresh tokens in FOLIO so our access tokens can be short lived. We should get to this sooner rather than later.
As I didn't see an existing JIRA filed for refresh tokens, this has been created to ensure we keep it visible on our backlog. We also have some decisions to make regarding refresh token implementation, such as validation, expiration, revocation, and rotation. There are likely suitable third-party libraries worth considering as well, so we're not re-inventing the wheel here.
https://tools.ietf.org/html/rfc6749#section-1.5
https://tools.ietf.org/html/draft-ietf-oauth-v2-threatmodel-08#section-4.1.2
TestRail: Results
Attachments
Issue Links
- relates to
-
FOLIO-3897 Add environment variables for RTR modules to snapshot envs
-
- Closed
-
-
MODAT-56 validate user deactivation when checking access token
-
- Closed
-
-
UXPROD-39 Local password management
-
- Closed
-
-
FOLIO-1332 SPIKE: Design/Discuss Overrides
-
- Closed
-
-
FOLIO-1485 Folio testing backend build fails due to incompatible authtoken interface versions
-
- Closed
-
-
FOLIO-2524 Security Audit raised issues
-
- Open
-
-
FOLIO-2556 SPIKE: investigate refresh tokens support in FOLIO
-
- Closed
-
-
MODLOGSAML-92 SSO Logout does not destroy SAML session
-
- Closed
-
-
MODLOGSAML-94 Provide SLO (Single Log Out) endpoint to be called by SSO IdP
-
- Closed
-
-
STCOR-532 Logout from FOLIO, keep SSO login
-
- Closed
-
-
UIU-1324 Users that are deleted or deactivated can stay logged in in folio until their token expires (=for a VERY long time)
-
- Closed
-