goauthentik / authentik

The authentication glue you need.
https://goauthentik.io
Other
13.78k stars 927 forks source link

Allow end users to create app passwords with longer (or no) expiry #5881

Closed ruifung closed 7 months ago

ruifung commented 1 year ago

Is your feature request related to a problem? Please describe. So I have calibre-web authenticating to authentik via LDAP (for it's OPDS function). With MFA enabled, ideally that would use an app password. However, user created app passwords have a (fixed?) lifetime of 30 minutes which is not ideal for this use case.

Describe the solution you'd like An option to allow users to create longer lived app passwords, or even potentially non-expiring one.

Describe alternatives you've considered Some way to alter the default lifetime of those app passwords, but might not be ideal I suppose.

Additional context Add any other context or screenshots about the feature request here.

ekrekeler commented 1 year ago

I second this, having no way to extend the expiration past 30 minutes makes App Passwords unusable for purposes other than evaluation.

Also if it's not too much trouble, I think it would be a good idea to have a configurable policy for this where administrators can set min/max/default expiration time. Maybe for Tokens too 😄

ruifung commented 1 year ago

I'd like to add a note here, the issue is specifically with app passwords created from the end user interface.

The creating them from the admin side faces no such limitations. But yes, this effectively renders app passwords effectively useless in scenarios where it's an end user trying to create the app password.

ekrekeler commented 1 year ago

The creating them from the admin side faces no such limitations.

I didn't even realize you could create them in the admin panel. Thanks for pointing that out!

Aljutor commented 1 year ago

Is there any plans for this functionality?

archont94 commented 2 weeks ago

@BeryJu this MR allows only to adjust token expiry, not app password. In order to use basic auth app password have to be used (not token) which make it hard to use. Is there a way to adjust maximum validity of app password?