We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configuration option oauth2.INVALIDATE_REFRESH_TOKENS defaults to false. For public clients, refresh token invalidation should be the default following OAuth security best practice https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-22#name-refresh-tokens
Refresh tokens for public clients MUST be sender-constrained or use refresh token rotation
The configuration option would then apply only to confidential clients.
No response
The text was updated successfully, but these errors were encountered:
Relevant code
gitea/routers/web/auth/oauth.go
Lines 149 to 156 in d1e066f
Lines 732 to 739 in d1e066f
Sorry, something went wrong.
No branches or pull requests
Feature Description
Configuration option oauth2.INVALIDATE_REFRESH_TOKENS defaults to false. For public clients, refresh token invalidation should be the default following OAuth security best practice https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-22#name-refresh-tokens
The configuration option would then apply only to confidential clients.
Screenshots
No response
The text was updated successfully, but these errors were encountered: