Skip to content

Conversation

@julien-nc
Copy link
Member

When "Store login token" is enabled, the current logic is incorrect. We logout if the login oidc token was not found in the session. We should avoid doing that if we know we are not in a session started by user_oidc (when using an app password or after a direct login for example).

This PR add a step in the oidc login token check to abort when either:

  • the session auth token cannot be found
  • or the session auth token does not have the SCOPE_SKIP_PASSWORD_VALIDATION scope

This should prevent unexpected disconnections from the desktop client.

@julien-nc julien-nc requested a review from blizzz July 25, 2025 10:47
@julien-nc julien-nc added bug Something isn't working 3. to review labels Jul 25, 2025
@julien-nc julien-nc force-pushed the enh/noid/improve-login-token-check branch from 84b36eb to e330f10 Compare July 30, 2025 13:06
@julien-nc julien-nc force-pushed the enh/noid/improve-login-token-check branch from e330f10 to 6496584 Compare August 25, 2025 12:12
@julien-nc julien-nc force-pushed the enh/noid/improve-login-token-check branch from 6496584 to 3a37e5b Compare September 1, 2025 08:22
@julien-nc julien-nc merged commit 1834f0f into main Sep 1, 2025
38 checks passed
@julien-nc julien-nc deleted the enh/noid/improve-login-token-check branch September 1, 2025 08:38
@julien-nc julien-nc mentioned this pull request Sep 1, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3. to review bug Something isn't working

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants