Sessions that stretch past the token time-to-live should auto-refresh #95

Closed
opened 2023-12-30 06:18:45 +00:00 by mcataford · 0 comments
mcataford commented 2023-12-30 06:18:45 +00:00 (Migrated from github.com)

Description

Sessions are currently limited in time by the JWT expiration time. Once they expire, further attempts to interact with the API will kick the user off because of expired credentials.

The application should allow refreshing the token to avoid having to re-log in.

Further reading

👁️ What Are Refresh Tokens and How to Use Them Securely

## Description Sessions are currently limited in time by the [JWT expiration time](https://github.com/mcataford/rotini/blob/b243e309d7d089e978c36ed28c6799eb7c8619d5/backend/rotini/base/settings.py#L18). Once they expire, further attempts to interact with the API will kick the user off because of expired credentials. The application should allow refreshing the token to avoid having to re-log in. ### Further reading :eye: [What Are Refresh Tokens and How to Use Them Securely](https://auth0.com/blog/refresh-tokens-what-are-they-and-when-to-use-them/)
This repo is archived. You cannot comment on issues.
No milestone
No project
No assignees
1 participant
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: marc/rotini#95
No description provided.