-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[TASK] Clean up stored auth tokens #628
Labels
Comments
18 tasks
roberlander2
added a commit
that referenced
this issue
Jan 5, 2023
roberlander2
added a commit
that referenced
this issue
Jan 7, 2023
roberlander2
added a commit
that referenced
this issue
Jan 9, 2023
roberlander2
added a commit
that referenced
this issue
Feb 6, 2023
shurwit
added a commit
that referenced
this issue
Jun 28, 2023
* update logging library to v2 * revert testing changes [#624] * upgrade core-auth-library-go to v2.1.0, add empty enc APIs policy [#624] * remove individual web auth entities, use claimsCheck functions * upgrade auth-lib and logging-lib versions [#624] * clean up unnecessary schema files, upgrade dependencies, trouble with openapi3 example validation [#624] * downgrade openapi to 0.110.0, remove more unnecessary schemas [#624] * update error messages with new logutils strings [#624] * update swagger docs to only use yaml syntax [#624] * update changelog * fix typo * logging adjustments, fix comment * bug fixes * do not store access tokens in DB, encrypt oidc tokens in login session params * return raw oidc tokens in login, refresh responses, only store encrypted refresh token, add decryption function * remove whitespace from decrypted refresh tokens * store hashed refresh tokens, prefix refresh tokens with session ID, remove some refresh token logging * first implementation of session ID rate limit * delete login session on rate limit hit * add allow legacy refresh flag to env vars, don't send oidc refresh tokens to client * update login and refresh response docs * limit block size in pkcs7 padding * limit ciphertext size * don't allow negative ciphertext size * fix padded ciphertext length * use AES encryption in GCM mode instead of CBC, store nonce in session params [#628] * update usage of global configs, will probably update to be used more like bb template configs [#628] * start refactoring GlobalConfig into Config [#628] * add new files * finish global_configs -> configs refactor, bug fixes [#628] * handle backward compatibility * use Log.SendHTTPResponse * setup CORS handler in web adapter * update go mod * fix go mod * update changelog * update config data type [#632] * gen mocks * fix configs, docs * fix admin update config API [#632] * fix changelog, merge changes from develop * update configs APIs [#632] * bug fixes * do not setup cors if there are no allowed origins [#632] * move storage out of web package, upgrade dependencies --------- Co-authored-by: Stephen Hurwit <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Currently we store several auth tokens in the database. While this is not inherently a security risk, it would be safer to avoid storing these tokens directly when at all possible.
Acceptance Criteria
<session-id>:
The text was updated successfully, but these errors were encountered: