-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support the prompt parameter #2208
Comments
It would be wonderful if this can be implemented, this would make 3rd-party integration with a difficult customer - well - less difficult :) |
Is there a roadmap on this? This is basically making it impossible to do a good implementation for our users |
Hiya @jdegger , this is not currently on the near term roadmap. Please upvote it (if you haven't already, I don't know how to see individual upvotes). Here's our general roadmap guidance: https://fusionauth.io/docs/v1/tech/core-concepts/roadmap Thanks! |
Just to chime in, my company is also really interested in this. It's a bad look for us right now that our new auth provider doesn't support this (highly visible) white labeling feature for auth applications. |
For all on this thread, are you mostly looking for For some context, here is how I am thinking about each of these prompt values.
The problem is that this parameter doesn't provide any security - the user could simply remove this parameter from the request to bypass this requirement. So if you were to want this feature for this use case, it doesn't seem like it actually offers you any security. It would only be a hope that the user does not modify the URL and then re-use their existing SSO session. Feel free to comment if you have an opinion on this one, or if there is another use case that you think this solves that would not require any confidence that the user actually re-authenticated. The way I would think about this - is if you really need the user to re-authenticate, you should perform an in-app step up, or delete the user's SSO session and then redirect them to login to ensure they must login. One option would be if, if the returned
Does anyone have a use case that would require consent, and you wouldn't otherwise be able to use a 3rd party application config, and would want to enable or disable consent on a per request basis? Knowing that the user could intercept this URL and remove or modify this parameter?
This seems interesting and would allow you to select from multiple active SSO sessions for users in the same FusionAuth tenant. Currently this is not possible. We do support multi-tenant SSO, but if you have more than one user in a tenant, you can only have one active SSO at a time. Is this specific option interesting to anyone? Feel free to leave comments for any other specific use cases I'm missing here. Thanks for your interest! |
@robotdan For us, we are looking for the prompt=login variant, the use case is very different from what you are describing. This is important because the solution you are providing is not working as expected. We are relying on solutions like react-native-app-auth to provide us with the login screen in our app. On iOS we have the option to choose for a private session which makes it possible for us to pick up on the correct user but on Android the login credentials of any existing user are cached and passed through. This results in the wrong user being logged in, which we can not prevent. The three solutions being provided in the community are (FormidableLabs/react-native-app-auth#723)
The use case we are struggling with is as follows:
The prompt=login would resolve the issue where we can make sure the correct user is signed in, the one we asked for. |
Additionally, this behavior was also described here: #1999 This is linked as a related issue in the original ticket but I do not see this back in your understanding of adding and supporting prompt=login |
This would help us add Authentication to other providers like convex. The way that convex currently handles this is to make an additional call to get the accesstoken passing it back to convex. Example using Auth0 Open PR to add FusionAuth: get-convex/convex-js#13 |
Thanks @jdegger for your detailed response, this is very helpful. |
prompt=none is the main one for us, for the automatic-silent-renew with react-oidc client. otherwise we have to implement our own gross hacks/workarounds for refreshing the token in other ways. eventually this leads to the SSO session actually expiring since they spend all their time in our app and not fusionauth side, so then when switching to a different application of ours on the same platform they must login again (which we often get complaints about) |
Hi, it's been almost 2 years since the initial issue creation. Is there an update on this? We are still eagerly waiting for a solution to this problem. Honestly, we would have switched providers because of this issue if it wasn't a big hassle... |
hi @jdegger , thanks for your feedback; I really appreciate it. I also appreciate your comment on which of the various forms of This issue is on our radar (I think it is the most upvoted open issue) but we don't have a firm timeline for the feature we can share. As you can imagine we're juggling a number of priorities and are trying to balance them all. |
Support the prompt parameters
Problem
If you want to use the
prompt
parameter, you can't. It is sad.Solution
Support the prompt parameter.
none
(support for silent authentication)login
consent
select_account
The
login
prompt would likely solve the issue requested via #1999.Alternatives/workarounds
NA
Additional context
OIDC
Silent authentication
An example 3rd party library using this parameter to do a silent "renew"
Auth0 doc for this feature:
Related
ForceAuthn
attribute when FusionAuth is the IdP via SAML v2.0 #2989Community guidelines
All issues filed in this repository must abide by the FusionAuth community guidelines.
How to vote
Please give us a thumbs up or thumbs down as a reaction to help us prioritize this feature. Feel free to comment if you have a particular need or comment on how this feature should work.
The text was updated successfully, but these errors were encountered: