Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Token management and default TTL #21320

Open
fpetersen-gl opened this issue Jan 10, 2025 · 0 comments
Open

Token management and default TTL #21320

fpetersen-gl opened this issue Jan 10, 2025 · 0 comments
Labels

Comments

@fpetersen-gl
Copy link
Contributor

What problem or job are we going after?

An admin can create auth tokens for token access for a user. If this user is a user from OIDC/LDAP (e.g. keycloak) and that user is disabled later in the auth server, the auth tokens still remain valid, because the user still has the "enabled" flag in the Graylog Database. There is no sync process which will subsequently remove the enabled flag on the record, regardless of the status of the external account. As a result, an API token belonging to a disabled or deleted user can potentially be used to perform actions.

Compounding this, there is no TTL configuration available right now, so when a token is created it will currently persist until deleted. There is no centralized view in which an administrator can review and manage all of the current active tokens - the Administrator currently needs to navigate to the System > Users > Edit user > Edit Tokens on a per-user basis.

The persistence and difficulty of managing of these tokens represents a bit of a security gap.
Who faces this problem and how important is it to them?

This issue impacts any users with external OIDC/LDAP users that create API tokens.
How do they solve these problems today?
At present, we depend on the vigilance of administrators to manage API token state.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant