-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UI - Improve autologin experience when wrapped_token
provided
#5107
Comments
Logout is implemented as its own route in the application, so not the most elegant, but you could point them at the logout url with the query parameter. This would log out the current session, but the query param is bound at a higher level in the route hierarchy and only consumed on the auth route, so it stays in the url as the app gets redirected to auth, and then the normal lookup / fill / submit works as if you'd just input it at the root URL. I tested this locally and it works, this was the URL: |
Thanks, I'll give this a go. It's more or less good enough for what I'm trying to achieve. It would be great to be able to link directly to a specific secret so the person I'm sharing the secret with doesn't have to click through the UI and in doing so decrease the token's remaining number of uses, but I'm happy enough with this as a solution so I'll go ahead and close this. |
@meirish Almost a year on, just wanted to check back in to confirm whether #5107 (comment) is still the recommended solution to this? |
@meirish That's great news! Thanks for the update. |
Is your feature request related to a problem? Please describe.
#4854 introduced the ability to auto-login via a new query parameter (
wrapped_token
). However, this only works the first time someone follows the link. Once they are logged in, it won't work if they follow another link with a differentwrapped_token
Describe the solution you'd like
It would be great to either have the UI:
wrapped_token
parameter is present.My use-case is sharing of ephemeral secrets over insecure channels (e.g. sending credentials over Slack). The token linked to these credentials has a limited number of uses and a TTL of a few minutes, so is quickly destroyed.
The text was updated successfully, but these errors were encountered: