OAuth 2.0 Token Revocation

  Рет қаралды 5,087

Jan Goebel

Jan Goebel

Күн бұрын

Пікірлер: 9
@jgoebel
@jgoebel 2 жыл бұрын
What do you think about this video? Let me know in the comments below.
@lorenzo_campanile
@lorenzo_campanile 10 ай бұрын
Your video series about OAuth 2.0 is great, thank you for your work. Obviously, the token revocation can work only if the resource server performs a token introspection on the auth server. Or maybe there is some particular technique that I am missing?
@jgoebel
@jgoebel 10 ай бұрын
yes, that's why the token lifetimes should not be too long and for critical actions it is a good practice to ask the user again to log in (e.g. if you make a purchase or so)
@tinaraj6033
@tinaraj6033 2 жыл бұрын
could you please explain situations in which a single access token is revoked, without deleting the authorization? and under what circumstances will it be called?
@Masteroxify
@Masteroxify 10 ай бұрын
But the old token is still valid in another microservices untill it expires.
@jgoebel
@jgoebel 5 ай бұрын
Yes, that's why there is the concept of OAuth token introspection
@mannumannu9200
@mannumannu9200 2 жыл бұрын
After revoking, we need to store revoked token somewhere, something like blocked tokens table, Am I right? Or there is another solution?
@jgoebel
@jgoebel 2 жыл бұрын
The authorization server will store at least the id of the revoked token. If the protected resource is only validating the token locally (this is possible if it is a self-contained token like a JWT), then there could be a propagation delay. This means that the protected resource would grant access even though the token has been revoked. So unless 1. the protected resource shares some state with the authorization server (which is realistically only feasible if both the authorization server and the protected resource are managed by the same party) or 2. the protected resource used the token introspection endpoint to check if the token is active or 3. the system uses opaque tokens which requires hitting the authorization server for every single request anyway, there could be a propagation delay. This is sort of the downside of structured, self-contained tokens. I have recorded another video about token introspection which I will publish in the future where this is explained.
@mannumannu9200
@mannumannu9200 2 жыл бұрын
@@jgoebel I read an article jwt should not be used as session management. Hope you will also cover it. Thanks for content
OAuth 2 Token Introspection
8:07
Jan Goebel
Рет қаралды 8 М.
When u fight over the armrest
00:41
Adam W
Рет қаралды 31 МЛН
Из какого города смотришь? 😃
00:34
МЯТНАЯ ФАНТА
Рет қаралды 2,5 МЛН
FOREVER BUNNY
00:14
Natan por Aí
Рет қаралды 27 МЛН
The Ultimate Sausage Prank! Watch Their Reactions 😂🌭 #Unexpected
00:17
La La Life Shorts
Рет қаралды 8 МЛН
What are Refresh Tokens?! and...How to Use Them Securely
19:29
Taking over a website with JWT Tokens!
14:27
Tech Raj
Рет қаралды 60 М.
OAuth 2.0 Pushed Authorization Requests
9:35
Jan Goebel
Рет қаралды 3,8 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
OAuth 2.0 - a dead simple explanation
9:16
Jan Goebel
Рет қаралды 24 М.
Why is JWT popular?
5:14
ByteByteGo
Рет қаралды 337 М.
OAuth 2.0 JWT-secured Authorization Requests (JARs)
8:07
Jan Goebel
Рет қаралды 3,6 М.
Proxy vs Reverse Proxy vs Load Balancer | Simply Explained
13:19
TechWorld with Nana
Рет қаралды 213 М.
OpenID Connect vs OAuth | OpenID Connect explained
8:50
Jan Goebel
Рет қаралды 40 М.
OAuth 2.0 - Token Exchange
14:34
Sascha Preibisch
Рет қаралды 11 М.
When u fight over the armrest
00:41
Adam W
Рет қаралды 31 МЛН