Replies: 2 comments
-
|
How would it fit with Keycloak's current architecture? As far as I can tell, the only SSO-level administrative permissions are either granted via the admin interface itself (where client-specific rules can come into play) or via service accounts (which don't have an associated session, all operations are performed via API requests). Other clients that may link to administrative permissions can also have client-specific rules. Because of how SSO services work, the session timeouts only directly affect the SSO service's session itself, not how long sessions in client applications last, so it's not directly enforceable globally (e.g., the application may have a 24 hour session timeout, completely separate from the SSO). Applications can also add additional privilege escalation tests via step-up authentication, forcing user re-authentications, and so on, if needed. |
Beta Was this translation helpful? Give feedback.
-
|
There are three kind of admin roles I think of.
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Auditors often ask for more restrictive timeout settings for administrative users than normal users. Currently this is only possible on a per client basis but not on a per role basis.
What about if we introduce special role attributes
and handle this as an upper-bound for the lifespans defined in the realm or client. This means the lowest value of what is defined per realm/client and roles the user is granted wins.
I am bit unsure if we need "remember me" values, I would keep it simple and just say the attributes in the role are a fixed upper boundary no matter if remember me is used or not. For offline tokens I think this is then intentionally used and should not be restricted by the role attributes.
From a data model perspective we could store them as role attributes, but probably the Admin Console would benefit from a separate tab in the role create/edit dialogs.
I checked the code base the token/session lifetime calculation is not build extendible so we would really need to implement that in Keycloak itself.
What do you think?
BjΓΆrn
Beta Was this translation helpful? Give feedback.
All reactions