-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce Session Timeout on UI #421
Comments
Hi @manjulaK, thanks for raising the issue. For reference here is some more detail on the issue: when a user logs in to data.all UI the authentication tokens provided last for 1h before they expire. If the user then refreshes the UI page, we request a new token, but the user does not need to log in again. For security, we would like to force the logout of the user after the session has timed out. We will need to review the current implementation ( |
What we have tested and confirmed so far : 1) Cognito does allow for refresh tokens to be set to be refreshed with a minimum of 60 mins 2)data.all by default allows sets this refresh value to 30 days . There should be a configuration parameter to enforce session timeout |
### Feature or Bugfix <!-- please choose --> - Feature ### Detail Allows user to configure a session timeout . Today data.all by default sets the refresh token to 30 days but with this change it becomes configurable ### Relates #421 ### Security Please answer the questions below briefly where applicable, or write `N/A`. Based on [OWASP 10](https://owasp.org/Top10/en/). - Does this PR introduce or modify any input fields or queries - this includes fetching data from storage outside the application (e.g. a database, an S3 bucket)? - Is the input sanitized? - What precautions are you taking before deserializing the data you consume? - Is injection prevented by parametrizing queries? - Have you ensured no `eval` or similar functions are used? - Does this PR introduce any functionality or component that requires authorization? - How have you ensured it respects the existing AuthN/AuthZ mechanisms? - Are you logging failed auth attempts? - Are you using or adding any cryptographic features? - Do you use a standard proven implementations? - Are the used keys controlled by the customer? Where are they stored? - Are you introducing any new policies/roles/users? - Have you used the least-privilege principle? How? By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. Co-authored-by: Manjula <manjula.kasturi@gmail.com>
Merged and released with v2.1.0 🚀 |
It is important that the UI times out after a preconfigured session limit (set in cdk.json). Current behaviour is that when refreshed a new session is started and user continues to be active . This is true for the all versions of data.all
The text was updated successfully, but these errors were encountered: