This is an automated email from the ASF dual-hosted git repository. jleroux pushed a commit to branch trunk in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git
The following commit(s) were added to refs/heads/trunk by this push: new 88c5106fef Improved: Authentication refresh token mechanism feature (OFBIZ-13212) 88c5106fef is described below commit 88c5106fef4e80cf089ed1ba0f00ae7026df0d15 Author: Jacques Le Roux <jacques.le.r...@les7arts.com> AuthorDate: Sun Apr 27 10:06:26 2025 +0200 Improved: Authentication refresh token mechanism feature (OFBIZ-13212) The refresh token validity is set to 84,600 seconds, ie almost a day (23,5 hours). That sound too much to me. I believe 8 hours, or even less, would be enough. People are rarely straight working more on a Single-Page Applications (SPAs) or a mobile application which are mostly what the consumers of ID tokens do as explained by https://auth0.com/blog/refresh-tokens-what-are-they-and-when-to-use-them/#Token-Types For security reason, this sets security.jwt.refresh.token.expireTime to 28800 seconds, ie 8 hours. --- framework/security/config/security.properties | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/framework/security/config/security.properties b/framework/security/config/security.properties index 21d584bca0..1d365ea88d 100644 --- a/framework/security/config/security.properties +++ b/framework/security/config/security.properties @@ -150,7 +150,7 @@ login.secret_key_string=p2s5u8x/A?D(G+KbPeShVmYq3t6w9z$B&E)H@McQfTjWnZr4u7x!A%D* security.jwt.token.expireTime=1800 # -- Time To Live of the refresh token send to the external server in seconds -security.jwt.refresh.token.expireTime=84600 +security.jwt.refresh.token.expireTime=28800 # -- Enables the internal Single Sign On feature which allows a token based login between OFBiz instances # To make this work you also have to configure a secret key with security.token.key