-
Notifications
You must be signed in to change notification settings - Fork 225
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refresh_token_expires_in missing #1372
Comments
This library supports OAuth2.0/OIDC standard, which defines The BTW: Which IDP are you using? |
Looks like there is no |
I guess it's a Microsoft specificity
|
It would be quiet easy, what i do not like is that is not part of the spec... similar to
|
Can I add a vote for this enhancement. Keycloak also supports refresh_token_expires_in; and we're currently seeing behaviour where oidc-client-ts tries to renew an access token using a refresh_token that is known to be expired. Happy to look into submitting a PR if it's likely to be accepted. |
Approving this would also be a quick-fix to allow users of the library to implement refresh_token_expires_in ourselves. |
Good afternoon,
Calling the IdP /token (grant_type: authorization_code), I receive this attribute in the response:
refresh_token_expires_in: 3600
I cannot find this attribute in the repo source code and this attribute is lost in the oidc:user session storage.
Is there a reason for this attribute to be ignored by the library?
Thank you
The text was updated successfully, but these errors were encountered: