Hi Torsten,

This is the module I much prefer. By default all refresh_tokens are bound to the user's authenticated session. When the authentication session is terminated, the refresh_tokens are invalidated. If a client wants to get a refresh_token that is NOT bound to an authentication session, then it much explicitly request the "offline_access" scope which then provides a consent interaction with the user which allows the user to know that this client wants to access their resources even when the user isn't logged in (present). This also provides the AS with the ability to control which clients are authorized to request "offline_access" and hence restrict that capability to know/approved clients.

We've implemented this module in two different Authorization Servers.

Thanks,
George

On 11/15/18 9:28 AM, Torsten Lodderstedt wrote:
Hi all,

I‘m preparing a new section on Refresh Token best practices for the Security 
BCP. I‘m wondering whether anyone has implemented a binding of the refresh 
token‘s expiration/revocation with the state of the session the refresh token 
was issued in/for. So do you revoke refresh tokens when the user logs out from 
the AS or the session terminated for other reasons?

kinds regards,
Torsten.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to