tyk icon indicating copy to clipboard operation
tyk copied to clipboard

[TT-5894] Handle not-before-policy notification for compromised OIDC tokens

Open cuttingedge1109 opened this issue 2 years ago • 0 comments

Tyk comes with support for OpenID Connect (OIDC) Identity Tokens provided by any standards compliant OIDC provider. https://tyk.io/docs/advanced-configuration/integrate/api-auth-mode/open-id-connect/#setting-up-oidc

Main auth flow works correctly. But I request a solution for compromised tokens.

In Keycloak, if an access token or refresh token is compromised, access the Admin Console and push a not-before revocation policy to all applications. Pushing a not-before policy ensures that any tokens issued before that time become invalid. https://www.keycloak.org/docs/latest/server_admin/index.html#compromised-access-and-refresh-tokens not-before-policy consists of time and is pushed to client's admin url.

But now tyk has no endpoint to receive this from keycloak. I suggest that tyk has an endpoint to receive not-before-policy and if access token is issued before not-before-policy time, reject access (access token includes iat(Issued At) claim so we can check).

In this way, compromised access tokens are revoked.

cuttingedge1109 avatar Jun 23 '22 09:06 cuttingedge1109