Skip to content

Accessing fetch vs tokens, secrets #19

@josephguillaume

Description

@josephguillaume

I'm opening this issue to document/get my head around the current approach to security in resuming a session in solid-oidc.

My understanding of the current situation is:

  • it is common practice to have a global authenticated fetch, with some possible attacks on this documented here already
  • access tokens should not be stored outside closures
  • refresh tokens provide access to new access tokens, but refresh token rotation is considered a sufficient mitigation in some more general oidc settings
  • silent authentication without repeated consent is the current standard way of resuming a session, and relies on the client having an authenticated session at the authorization server OpenID provider

A sharp distinction is therefore made between access to fetch vs tokens and underlying secrets

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions