And as such, not easily elaborated over Twitter. The TL;DR is, a protocol artifact won’t solve that scenario- it just a heuristic and as such it can be handled out of band wit the exact same result.
1
1
One last data point.
I once worked on a product that erroneously returned an equivalent parameter. It was a royal fuckup as most (MOST) developers baked the assumption that the RT was valid for that time in their code, & didn’t handle revocations- with disastrous runtime results
1
1
I understand you, my only point is if we have a expires_in referencing the access_token, why not a RT_expores_in referencing the RT?!
1
Assumptions of AT validity window are more often correct.
The AT revocation/rejection is not as common a scenario as RT invalidation, we are only now starting to work on some scenarios (see stepup auth) whereas consent revocation (one way of revoking RTs is baked in core.
1
1
The consent revocation yes, but that’s 1) just one of the ways in which an RT might be invalidated 2) in practice there’s no obvious way of propagating that, whereas the RT invalidation is easy.
1
1
Yes, the client needs to be able to handle unexpected expiration of both the AT and RT, which tbh is more an argument that the AS should never return expires_in than an argument that it should return it for both tokens.
Aug 23, 2022 · 11:49 PM UTC
1
1


