Details
-
Feature Request
-
Status: Open
-
Major
-
Resolution: Unresolved
-
None
-
None
Description
Add possibility to configure reauthentication timeout for clients in Keycloak admin GUI (for each client independently in client's settings). This will be used as default if no reauth is asked by client on protocol level.
This is important feature to support long user SSO sessions (eg. weeks or even months)
with reauthentication for important actions as known from many sites like Googlem LinkedIn, Github etc.
This configuration option allows protecting Account and keycloak admin applications itself with reauthentication in this scheme, and also allows protecting other clients who can't be updated to force reauth on protocol layer.
Attachments
Issue Links
- blocks
-
RHD-949 Provide long login time-out for RHD website
- Done
- is duplicated by
-
KEYCLOAK-12405 Add support for default max age
-
- Closed
-
- is incorporated by
-
KEYCLOAK-2076 Support for long user sso sessions with reauthentication for important actions
-
- Closed
-
- relates to
-
KEYCLOAK-2070 Support for reauthentication in openid-connect IdP endpoint
-
- Closed
-