Open trishaanand opened 2 years ago
@sharat87, can we please prioritize this issue? An EE user has been waiting for a month.
@pranavkanade - This for me is intended behavior. We should not be logging users out of the IDP if they log out of Appsmith. We are a service provider and users might be using IDP with other service providers, we should take that as the primary behavior. This is also the common implementation across similar tools in the industry.
I've replied the same in the A-Force channel conversation as well last month. We can provide this as a secondary configurable behavior but, we need more feedback/requests for us to do that.
@infinitetrooper, I'd disagree with that stance strongly. The whole problem we're solving here is SSO, single-sign-on. Basically meaning that you sign-in with a username/password or other forms of authentication in one place, and they don't have to it on every service they use. This is the point and purpose of SSO in an organization. But the way this manifests is that the user attempts to login to an application, which then asks the IdP, and then the user logs into their IdP. But once this happens, they're practically logged-in to all their internal services that use this SSO. This is where and how the problem is solved.
Now this translates to, I, as a user, logged in to Appsmith, and that logged me in to all these other services too. So, naturally, if I logout of Appsmith, I'll be logged out of all the other services too, right? That's the assumption a user would have, and that's what I'd have.
Both SAML and OIDC schemes for SSO have specific provisions to do single-logout, to address this exact problem. In fact, in some sense, this isn't even a feature request, it's a bug that our SAML and OIDC implementations are incomplete. We don't support logout.
However, all that said, I do agree with you, if we're talking about OAuth login methods, like Google or GitHub. There, if I logout of Appsmith, I don't expect to be logged out of Google, and OAuth is okay with that. That's how it works. It's not branded as an SSO solution, and it's not one.
But for SSO, logout has to be single too.
Understood @sharat87. I see two areas we need to improve.
Thanks. Very good questions.
Just the confirm @sharat87 summary here, we ran into exact this scenario and our QA team flagged the behavior as non compliant. We're using auth0 for authentication, and each app is expected to be able to do a global log out of the user. So it would be great if this issue can be tackled.
Just noticed that this is assigned to me. I'm switching that to @infinitetrooper and @trishaanand, so it can be prioritized and picked up in the team. 🙏
Currently facing this issue when integrating with Keycloak as IdP. The QA team are quite confused when they log out on shared machines only to have the next user come along, not be asked to provide a username/password and take over the old session.
Thanks,
Is there an existing issue for this?
Description
When the user logs out of Appsmith, the instance configuration should support adding a flag which logs the user out of IAM as well.
Steps To Reproduce
Public Sample App
No response
Version
Prod
Front conversations