Skip to content
This repository has been archived by the owner on Feb 12, 2022. It is now read-only.

Make sure to never request login from Heroku properties that don't require it #145

Open
brandur opened this issue Mar 5, 2015 · 2 comments

Comments

@brandur
Copy link
Contributor

brandur commented Mar 5, 2015

Some Heroku properties like Dev Center will attempt to detect a logged in session via the presence of the Heroku nonce token in a user's cookie. When detected, they'll fetch an access token from Identity, usually so that they can do something fairly simple like put the user's e-mail in the property's header.

The problem here is that a Heroku nonce doesn't guarantee a valid session because when a session is invalidated or expires, there is no way for us to remove a none from the browsers of our users. This results in Dev Center attempting to obtain an access token and Identity undesirably asking that they log in when it realizes that they don't have a session. No one should ever have to log in to read some docs.

Build a system that can identity OAuth clients that like logged in users, but don't require them. When a case like the above is detected, instead of requesting login Identity should simply invalidate the Heroku nonce and pass the user back to Dev Center. This system might look like an additional flag on registered_clients.

@mikehale
Copy link
Contributor

mikehale commented Mar 5, 2015

Huge 👍 to not having to login to read docs.

@raulb
Copy link
Contributor

raulb commented Apr 14, 2015

+1000

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants