This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git


The following commit(s) were added to refs/heads/trunk by this push:
     new 88c5106fef Improved: Authentication refresh token mechanism feature 
(OFBIZ-13212)
88c5106fef is described below

commit 88c5106fef4e80cf089ed1ba0f00ae7026df0d15
Author: Jacques Le Roux <jacques.le.r...@les7arts.com>
AuthorDate: Sun Apr 27 10:06:26 2025 +0200

    Improved: Authentication refresh token mechanism feature (OFBIZ-13212)
    
    The refresh token validity is set to 84,600 seconds, ie almost a day (23,5 
hours).
    That sound too much to me. I believe 8 hours, or even less, would be enough.
    People are rarely straight working more on a Single-Page Applications (SPAs)
    or a mobile application which are mostly what the consumers of ID tokens do
    as explained by
    
https://auth0.com/blog/refresh-tokens-what-are-they-and-when-to-use-them/#Token-Types
    
    For security reason, this sets security.jwt.refresh.token.expireTime to 
28800
    seconds, ie 8 hours.
---
 framework/security/config/security.properties | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/framework/security/config/security.properties 
b/framework/security/config/security.properties
index 21d584bca0..1d365ea88d 100644
--- a/framework/security/config/security.properties
+++ b/framework/security/config/security.properties
@@ -150,7 +150,7 @@ 
login.secret_key_string=p2s5u8x/A?D(G+KbPeShVmYq3t6w9z$B&E)H@McQfTjWnZr4u7x!A%D*
 security.jwt.token.expireTime=1800
 
 # -- Time To Live of the refresh token send to the external server in seconds
-security.jwt.refresh.token.expireTime=84600
+security.jwt.refresh.token.expireTime=28800
 
 # -- Enables the internal Single Sign On feature which allows a token based 
login between OFBiz instances
 #    To make this work you also have to configure a secret key with 
security.token.key

Reply via email to