-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Provide a more sophisticated token cache L1/L2 (L1 in InMemoryCache, L2 IDistributedCache, with encryption strategy) #957
Comments
It would be great that when the required access token has expired, or does not exist in the cache, the lib just tries to get a new access token. We do this with other OIDC, OAUTH clients. Would this be possible? Greetings Damien |
@damienbod : in a web app? or in a web API? |
Hi @jmprieur In both, I don't see this from the docs. But you say then that if I don't use a persistent cache, then I can use the [AuthorizeForScopes] attribute on my API and it will get me a new token if the the cache has been reset? Will try this. => Tried this and it does not help (hopefully I try this correctly.) I can show the problem with the demo: https://github.com/damienbod/AzureADAuthRazorUiServiceApiCertificate/tree/main/DownstreamApis Steps to reproduce:
If I reset my persistent cache or use in memory cache I have this problem.The consent has been already given. To solve I need to delete my cookies from the browser or use a persistent cache but then problem will exist here as well if the cache gets reset. It would be great if the lib could recover from this without having to delete the APP cookies. Thanks Damien |
Thanks @damienbod |
Included in 1.8.0 release |
Is your feature request related to a problem? Please describe.
@henrik-me to update or @jennyf19 / @jmprieur after discussing with @henrik-me and/or @GeoK
Describe the solution you'd like
TBD
Describe alternatives you've considered
TBD
Additional context
See MISE
The text was updated successfully, but these errors were encountered: