-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IUA Refresh token handling #20
Comments
We won't allow refresh token, since their lifetime management is quite difficult. |
we are waiting currently on feedback from trifork or @unixoid |
Proposal for Using Refresh Tokens in ITI-71Since ITI-71 is derived from the OAuth2 flow, we believe that it should adhere to the secure mechanisms provided by the standard, specifically the refresh token mechanism for obtaining new access tokens. The decision to prohibit the use of refresh tokens for IUA tokens has significant practical implications for both web applications and mobile apps: 1. Loss of Application State in Web ApplicationsRedirecting the browser to the Authorization Server for a new authentication session each time the IUA token expires can lead to a loss of application state.
2. User Experience Impact
3. Benefits and Security of Refresh Tokens
ConclusionProhibiting refresh tokens unnecessarily complicates the authentication flow for both end users and developers. We propose a reevaluation of this decision, considering additional security measures such as: ✅ Rotating refresh tokens – ensuring security while maintaining a seamless user experience. ✅ PKCE (Proof Key for Code Exchange) in the Authorization Code grant – increasing protection against attacks. By adopting these security enhancements, we can achieve both security and usability without sacrificing user experience. |
FYI @oliveregger @msmock - @limux82 represents the 'Trifork' case here. |
An IUA authorization server may not create an new authorization token, without verifying the user has a running session with But even if we had a OpenID Connect refresh token, the implementation would be cumbersome. If the IUA authorization server uses a refresh token via the backchannel the session information on the authorization server and browser cookie gets out of synch. The recommendation in the literature is to avoid useability problems with (hidden) IFrames. Is that impractical from your point of view? |
Yes, it is impractical. Silent authentication is highly discouraged: modern browsers block silent authentication using iframes due to tightened security measures (such as SameSite policies and third-party cookie restrictions). This method is unreliable, and mobile apps cannot support it at all since you simply cannot have an iframe in a mobile app. For this reason, many OIDC vendors recommend using PKCE along with rotating refresh tokens. |
Refresh token handling needs to be defined if allowed or not (refresh without authentication possible).
The text was updated successfully, but these errors were encountered: