-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to store the token in a caching tool #32
Comments
Hi! Thank you for the feature request. How ever, I think there's some misconceptions on how this works, so I'll try to explain it:
The configuration essentially is public keys from Azure. The JWT tokens are signed, and we can verify the JWT by using these public keys.
So to give a TL;DR:
Closing the issue, but please do not hesitate to comment or ask questions if something was unclear. 😊 |
Thank you for the explanation. So for my better understanding:
Are those correct? |
Correct.
Correct, if you refer the
Correct. 😊 |
Hi @JonasKs I have a few more questions about this and I'll be thankful if you take time and answer them:
Thank you in advance. |
Hi!
|
Thanks again for your kind reply :) |
Ability to store the token in a caching tool (e.g: Redis with TTL keys) to prevent checking with azure on every request
It would be great to have an ability in which we can store the user token in a caching tool like Redis and set a TTL for it so that it will expire after a while (Probably set the exact time azure would keep the session for the token), so it prevents sending request to azure AD to check the token on each request. I hope It's clear what I'm asking.
The text was updated successfully, but these errors were encountered: