-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWTでユーザー認証する #15570
Comments
多分全情報をJWTに乗せるのは悪手 |
全情報は載せない |
ホームタイムライン取得するAPIを考えると、必要なのはユーザーIDくらいで、ユーザー名とかは明らかに不要 |
あーサーバー側でってことか |
マスターのログイントークンをJWTに入れて |
これだとパフォーマンス向上のメリットは消えそう? |
JWTの有効期限を数分といった短い期間にする & ステートレス |
現実的には定期的にリフレッシュが必要ということを考えるとリフレッシュトークン<->ユーザーのキャッシュは持っておく必要があり、結局はパフォーマンス向上にはつながらなさそう |
いやリフレッシュの頻度によっては別にキャッシュ無くても良いか |
あと署名の生成・検証でどれくらいCPUを消費するのかは気になる |
HMAC-SHA512 ( |
I can take on this issue next week if no one is already working on an implementation, I wanted this for my own instance too. |
Schedule is not fixed yet, but we might do the overhaul of the login auth by @acid-chicken (#13865) so maybe we should coordinate who and when to actually implement |
I think transition to JWT (or any alternative format than random string we agree on) should be done first, because many features in #13865 are contingent upon a rich token format (tokens with structured info that backend can parse). パスワード認証を要求するすべてのエンドポイントを sudo トークンに置き換える -> this is essentially granular token policy sudo モード -> this needs ways to identify tokens too (like a token_sudo_until table), and we have to agree on a format first before all SSO -> many SSO services require you to store refresh tokens, so we need a rich format too |
I propose we do this, we don't have to have me or anyone dictate how it works, we can do a few stages
On second around we implement in this order again. |
Summary
JWTでユーザー認証する
Purpose
Do you want to implement this feature yourself?
The text was updated successfully, but these errors were encountered: