Closed ruifung closed 7 months ago
I second this, having no way to extend the expiration past 30 minutes makes App Passwords unusable for purposes other than evaluation.
Also if it's not too much trouble, I think it would be a good idea to have a configurable policy for this where administrators can set min/max/default expiration time. Maybe for Tokens too 😄
I'd like to add a note here, the issue is specifically with app passwords created from the end user interface.
The creating them from the admin side faces no such limitations. But yes, this effectively renders app passwords effectively useless in scenarios where it's an end user trying to create the app password.
The creating them from the admin side faces no such limitations.
I didn't even realize you could create them in the admin panel. Thanks for pointing that out!
Is there any plans for this functionality?
@BeryJu this MR allows only to adjust token expiry, not app password. In order to use basic auth app password have to be used (not token) which make it hard to use. Is there a way to adjust maximum validity of app password?
Is your feature request related to a problem? Please describe. So I have calibre-web authenticating to authentik via LDAP (for it's OPDS function). With MFA enabled, ideally that would use an app password. However, user created app passwords have a (fixed?) lifetime of 30 minutes which is not ideal for this use case.
Describe the solution you'd like An option to allow users to create longer lived app passwords, or even potentially non-expiring one.
Describe alternatives you've considered Some way to alter the default lifetime of those app passwords, but might not be ideal I suppose.
Additional context Add any other context or screenshots about the feature request here.