-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trace user identity throughout the system #5
Comments
History #1 Updated by Volodymyr Savchenko about 1 year ago Priority changed from Normal to High I have come to think that this feature might be quite important for support. Its all good with issue detection and resolution in principle, but would be much nicer if I knew who sent the job and could send a message back like "thanks for revealing the bug". Otherwise the users are left unhappy. #2 Updated by Volodymyr Savchenko 10 months ago Related to Story #21161: allow large queries added Target version set to ODA 1.3 Tracker changed from Feature to Story Assignee changed from Andrii Neronov to Mohamed Meharga It looks like we want to start from a possibility to create Drupal accounts, which will go for approval to us. Mohamed, can you give it a try. #6 Updated by Volodymyr Savchenko 2 months ago To summarize discussion of the last meeting: User identity is needed in order to: |
Follow the above document to define the JWT token. |
(copied from redmine) The following user roles have been created in Drupal (following the documents, doc-multi-user, roles and doc-multi-user/plan-roles-users.md :
Once the user is logged in the cookie Drupal.visitor.token is defined and it contains a JWT token followint the document Introduction to JSON Web Tokens Example of generated token: exp is the expiration time of the token which can be defined in the Drupal administration GUI as a life time in minutes. |
this remains: #7 |
Token, if provided, is decoded within the dispatcher and also validated (checking expiration, user role etc etc).
Was ther already some ideas regarding this point? |
Yes, it should be created on deployment, as a separate secret. It can be stored in the config, since it already has some secrets. Here we have an issue for this: #7 As an addtional safety measure, we could read the secret from location pointed out in the config, instead of storing it in the config directly. see comment on oda-hub/dispatcher-app#13 |
In abbc2ac I explained a bit the flow regarding the token |
Story #20099
The text was updated successfully, but these errors were encountered: