Skip to content

[FR] Support revocation date #205

Open
@FossPrime

Description

@FossPrime

Having a revokedAt field would allows to cheaply invalidate existing JWT tokens.

Steps to reproduce

  1. Have your session cookies compromised, Like LTT recently did
  2. Change your password

Expected behavior

Attacker should not be able to log in.

Actual behavior

JWT cookie will still be valid. So would the socketio reconnection key. Allowing the attacker to login to your account, despite having changed your password.

Context

I use SAML where cascading logouts are a core feature. You should be able to logout once, and have all your SAML apps be disconnected remotely.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions