Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auth: Detect and handle a revoked auth token. #9392

Open
aerych opened this issue May 17, 2018 · 4 comments
Open

Auth: Detect and handle a revoked auth token. #9392

aerych opened this issue May 17, 2018 · 4 comments

Comments

@aerych
Copy link
Member

aerych commented May 17, 2018

If a wpcom/Jetpack user visits https://wordpress.com/me/security/connected-applications they can opt to disconnect the mobile apps. This invalidates their bearer token and any subsequent request to the wpcom REST API requiring authentication will fail.

Investigate how to detect this scenario and, when detected, log the user out of wpcom (showing the welcome screen if necessary).

@rachelmcr
Copy link
Member

A user's auth token can also be revoked when their password is reset, which can be done by the user or for WordPress.com users may be done automatically for security purposes. See #10190 for more details about that case.

It can be very confusing to experience a revoked auth token, especially if you didn't take the action to revoke the token, since there is no indication in the app of what's happened.

@stale
Copy link

stale bot commented Sep 24, 2019

This issue has been marked as stale because:

  • It has been inactive for the past year.
  • It isn't in a project or a milestone.
  • It hasn’t been labeled [Pri] Blocker, [Pri] High, or good first issue.

Please comment with an update if you believe this issue is still valid or if it can be closed. This issue will also be reviewed for validity and priority (cc @designsimply).

@stale stale bot added the [Status] Stale label Sep 24, 2019
@aerych
Copy link
Member Author

aerych commented Sep 24, 2019

@designsimply do you think this one might be worth adding to our Groundskeeping list?

@rachelmcr
Copy link
Member

I'm going to add this to Groundskeeping because I think it's worth at least an initial investigation to document current behavior and expectations, and estimate how much effort it would be to update the app's behavior. (In my comment above I also mentioned that the auth token can be revoked on a password reset, but at this point not positive about the expectations there, either.)

@rachelmcr rachelmcr added this to To Do in Groundskeeping via automation Jul 24, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
No open projects
Groundskeeping
  
To Do
Development

No branches or pull requests

2 participants