Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OIDC backchannel logout #12710

Open
Anderen2 opened this issue Jan 16, 2025 · 0 comments
Open

OIDC backchannel logout #12710

Anderen2 opened this issue Jan 16, 2025 · 0 comments
Labels
enhancement New feature or request

Comments

@Anderen2
Copy link

Anderen2 commented Jan 16, 2025

Is your feature request related to a problem? Please describe.
There is currently no support for OIDC backchannel logout in Authentik. This causes application sessions to be kept active even though the user has signed out from Authentik.

Describe the solution you'd like
Support for the OpenID Connect back-channel logout spec.
This should be incorporated as a optional configuration parameter per OAuth2 provider.

For applications without a backchannel logout specified, or if the backchannel request failed, it would be nice if Authentik could notify the user that they might still be logged in.

Describe alternatives you've considered
A temporary workaround here is configuring the token timeout low.

Additional context
There also exists a OIDC front-channel logout method, however this is not used as often.

@Anderen2 Anderen2 added the enhancement New feature or request label Jan 16, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant