You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From security standpoint, we generally see a use-case where we may have to rotate client secret (regularly), but this brings in an impact to the client and force the client to start using new secret to avoid errors or downtime for their users.
In single sentence, I am proposing for a feature that can allow OIDC to authenticate client using new as well as old secret (for some time at least) giving enough time to the client to rotate password/secret used during authentication/authorization workflows.
I don't think, if we want to have a policy managing the rotation (that defines the timeframe for rotating secrets) also managed from within Hydra. That can still be managed outside of hydra.
Describe your ideal solution
Ideal Solution would be to
Support client authentication with new as well old secret.
Old secret can be still considered valid for some timeframe (preferably configurable at client level).
Retire old secret on demand using Admin API
Workarounds or alternatives
Only option we have now is to notify the client that they need to enforce the password/secret change and implement that in their app
Version
1.10.5
Additional Context
This feature has been requested based on this original ticket #3005.
The text was updated successfully, but these errors were encountered:
Preflight checklist
Describe your problem
From security standpoint, we generally see a use-case where we may have to rotate client secret (regularly), but this brings in an impact to the client and force the client to start using new secret to avoid errors or downtime for their users.
In single sentence, I am proposing for a feature that can allow OIDC to authenticate client using new as well as old secret (for some time at least) giving enough time to the client to rotate password/secret used during authentication/authorization workflows.
I don't think, if we want to have a policy managing the rotation (that defines the timeframe for rotating secrets) also managed from within Hydra. That can still be managed outside of hydra.
Describe your ideal solution
Ideal Solution would be to
Workarounds or alternatives
Only option we have now is to notify the client that they need to enforce the password/secret change and implement that in their app
Version
1.10.5
Additional Context
This feature has been requested based on this original ticket #3005.
The text was updated successfully, but these errors were encountered: