You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With OIDC the authentication state will be managed entirely by Spring as an HTTP session. This means that the frontend no longer has to store/handle a JWT for authentication. However, the inbox UI still needs to be aware of who is currently authenticated or not.
To address this problem #1518 adds a /users.getPrincipal endpoint that will return the profile information of the currently logged-in users.
So the flow would be as follows:
User loads the react app
App requests /client.config before rendering anything
If principal present: Store the user information in redux (not local storage) and proceed
@lucapette I think an even simpler implementation of this would be to move the inbox UI to the communication pod already. That way accessing the frontend itself is subject to authentication and the frontend does not need to implement any re-directs.
And since this would mean that we would replace Lua with (most likely) freemarker we can also pre-render in the user information so that the UI does not have to make a separate request to /users.getProfile
Prerequisite: #1518
With OIDC the authentication state will be managed entirely by Spring as an HTTP session. This means that the frontend no longer has to store/handle a JWT for authentication. However, the inbox UI still needs to be aware of who is currently authenticated or not.
To address this problem #1518 adds a
/users.getPrincipal
endpoint that will return the profile information of the currently logged-in users.So the flow would be as follows:
/client.config
before rendering anythingIf the oidc flow is successful the backend will redirect the user back to the app after 4. and the process will repeat.
The text was updated successfully, but these errors were encountered: