Having issues with Sliding cookies with identityServer. Lets say we have authentication cookie set to expire on identityserver at 1 hour - sliding = true. A client application that uses IdentityServer has an auth cookie is set to 30 minutes, sliding = true. The client application can slide it's cookie every > 15 minutes keeping the user logged in on the client application. However that does not sync back on identityServer side. After 1 hour the session there is effectively ended regardless of the client's sliding. The client will continue to work until it's cookie expires > 30 minutes if no sliding there happens..
The only time a slide on identityserver seems to happen is when the client cookie expires BEFORE the identityserver cookie. In that case, the client logs back in a again, a call to authorize, slides the identityserver cookie. Maybe thinking about this wrong, but expected that when a client cookie slides, this also calls to identityserver to slide that cookie as well (if > 1/2 the expry time).
.AspNetCore.Identity.Application
cookie. It seems that it will contain all the information inserted into my token as well. So there is multiple questions:Hi All, We are using IdentityServer4 , Cert-manager, Kubernetes setup. When using IdentityServer4 admin page we get this error. "unable to obtain configuration from well-known/openid-configuration". We do not get the same error on other pages but only on Identity4 admin. Anybody has faced same issue?
Hi All,
We identified the root cause. It was because https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/
We added this preferredChain: "ISRG Root X1" in Issuer.
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: letsencrypt-isrgx1
spec:
acme:
email: an@email.com
server: https://acme-v02.api.letsencrypt.org/directory
preferredChain: "ISRG Root X1"
Hope it helps to anyone having same problem!!
Regards,
Vishal
I'm using IdentityServer4 and I have implemented implicit flow using the demo UI. My client is using the consent screen and I have a case where I need to add some additional parameters to the token after consent. In consent controller POST action:
Is there a way to get the current token? I see that there is a state parameter sent to the controller and passed around with each call. Since the token is created after login, I'm guessing IS4 is using this state to keep the token somewhere in memory. Is there a way for me to retrieve it?
How can I modify the token and add additional claims to it at the consent POST action?
So I am trying to get global logouts working on my app. I have two MVC apps both setup up to use the oidc protocol. For grant types, it is set to hybrid.
When logging out I redirect to the EndSessionEndpoint with no params (I have no clue how to get the id_token_hint, doesn't seem to be in the user profile or my redirect endpoint).
The EndSessionEndpoint automagically creates a logoutId and redirects to my logout page. There I can click the logout button and that does a post request. This is where it seems to just not work. I call GetLogoutContextAsync. It has the client id, but no redirect URL. In addition, my identity context does not have me logged in.
Not sure where to go from here if anybody has any pointers.
I have just published a new blog post titled:
IdentityResource vs. ApiResource vs. ApiScope
https://nestenius.se/2023/02/02/identityserver-identityresource-vs-apiresource-vs-apiscope/
Any feedback is appreciated!
[ValidateAntiForgeryToken]
public async Task Logout()
{
await HttpContext.SignOutAsync(CookieAuthenticationDefaults.AuthenticationScheme);
await HttpContext.SignOutAsync(OpenIdConnectDefaults.AuthenticationScheme);
//Important, this method should never return anything.
}