-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Token Lifetime Recommendations #36
Comments
I think that "JWT AT (online)" should live longer than offline JWT, since they can be revoked. I suggest 24, so it's consistent with "Opaque AT" |
except that offline JWT might leak more information than online JWT, since the latter can be opaque. |
Yes, but leakage is independent of life time, isn't it? |
I'd say it's an increased risk (more chance of exposure), and therefore could be mitigated with shorter lifetimes? |
offline JWT is still a JWT and therefore, by definition not opaque. |
ah good point, I messed up what I wanted to write: the comparison was with the opaque AT: online opaque AT has lower risk than online JWT, while online JWT is revocable and offline not. So online JWT as such should probably be between those two, i.e. between 6 and 24 hours. |
Hello everyone, I have a few concerns regarding the way the table is split:
|
I fully agree with your points on opaque vs jwt. Essentially jwts can not be revoced, because their signature allows verifying them offline. Leaking personal data adds a different angle to things:
How does this influence our guidance on lifetimes in practice? I'm tempted to say it does not. Since the lifetime says nothing about when In addition I would claim that since all parties are bound to Sirtfi, plus |
Just noticed I forgot answering the RT question:
|
This issue was created with the document version "v1"
The current recommendation has:
Maybe this discussion needs to be taken in sub issues.
The text was updated successfully, but these errors were encountered: