Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix user role not updated by gatekeeper #344

Closed
filippomc opened this issue Oct 8, 2021 · 1 comment · Fixed by #379
Closed

Fix user role not updated by gatekeeper #344

filippomc opened this issue Oct 8, 2021 · 1 comment · Fixed by #379
Assignees
Labels
enhancement New feature or request scope:accounts
Milestone

Comments

@filippomc
Copy link
Collaborator

filippomc commented Oct 8, 2021

If a user role is updated on keycloak, the gatekeeper does not see the change.
Let's say that a user tries to access an application A which is not allowed -> 403 page.
If the admin gives the role that authorizes the user to enter the application and the user refreshes the page, still the user is not authorized.

So the gatekeeper uses old information (probably cached) about the user to check the access.

Possible solutions:

  • Reduce the time the gatekeeper refreshes the user information from keycloak
  • Improve the 403 page by giving a logout link so that the user can retry.
@filippomc filippomc added enhancement New feature or request scope:accounts labels Jan 11, 2022
@filippomc filippomc assigned zsinnema and filippomc and unassigned zsinnema Jan 14, 2022
@filippomc
Copy link
Collaborator Author

The keycloak parameter "access token lifespan" defines the expiration time for the token used by the gatekeeper

@filippomc filippomc added this to the v1.0.0 milestone Jan 19, 2022
@filippomc filippomc linked a pull request Jan 27, 2022 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request scope:accounts
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants