OAuth 2.0 Token Revocation

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ต.ค. 2024

ความคิดเห็น • 9

  • @jgoebel
    @jgoebel  2 ปีที่แล้ว +1

    What do you think about this video?
    Let me know in the comments below.

  • @lorenzo_campanile
    @lorenzo_campanile 9 หลายเดือนก่อน

    Your video series about OAuth 2.0 is great, thank you for your work.
    Obviously, the token revocation can work only if the resource server performs a token introspection on the auth server.
    Or maybe there is some particular technique that I am missing?

    • @jgoebel
      @jgoebel  8 หลายเดือนก่อน +1

      yes, that's why the token lifetimes should not be too long and for critical actions it is a good practice to ask the user again to log in (e.g. if you make a purchase or so)

  • @tinaraj6033
    @tinaraj6033 2 ปีที่แล้ว

    could you please explain situations in which a single access token is revoked, without deleting the authorization? and under what circumstances will it be called?

  • @mannumannu9200
    @mannumannu9200 2 ปีที่แล้ว

    After revoking, we need to store revoked token somewhere, something like blocked tokens table, Am I right? Or there is another solution?

    • @jgoebel
      @jgoebel  2 ปีที่แล้ว +1

      The authorization server will store at least the id of the revoked token. If the protected resource is only validating the token locally (this is possible if it is a self-contained token like a JWT), then there could be a propagation delay. This means that the protected resource would grant access even though the token has been revoked. So unless
      1. the protected resource shares some state with the authorization server (which is realistically only feasible if both the authorization server and the protected resource are managed by the same party) or
      2. the protected resource used the token introspection endpoint to check if the token is active or
      3. the system uses opaque tokens which requires hitting the authorization server for every single request anyway,
      there could be a propagation delay. This is sort of the downside of structured, self-contained tokens.
      I have recorded another video about token introspection which I will publish in the future where this is explained.

    • @mannumannu9200
      @mannumannu9200 2 ปีที่แล้ว

      @@jgoebel I read an article jwt should not be used as session management. Hope you will also cover it.
      Thanks for content

  • @Masteroxify
    @Masteroxify 9 หลายเดือนก่อน

    But the old token is still valid in another microservices untill it expires.

    • @jgoebel
      @jgoebel  4 หลายเดือนก่อน

      Yes, that's why there is the concept of OAuth token introspection