Closed arladmin closed 8 months ago
Hello @arladmin;
Not a Bug :)
The token serves to bypass user or presenter login when host protection or user authentication is enabled in the config.js file. If these settings are set to false by default, the token is unnecessary and remains unchecked.
// Configuration settings for host protection and user authentication
host: {
/*
Host Protection (default: false)
Enhance host security by enabling host protection. When enabled, user authentication is required.
Provide valid usernames and passwords in the users array or retrieve active users from a database
using the users_api_endpoint for validation.
*/
protected: true, // If set to true, tokens will be checked for direct joins
user_auth: true, // If set to true, tokens will be checked for direct joins
// Additional configuration options...
}
During our testing phase, we observed that the token is appropriately handled when host protection or user authentication is enabled, as demonstrated.
Please, join us on our Community forum on Discord here. If something is unclear, feel free to ask questions instead of opening an issue here, as this platform is primarily for confirmed bugs.
Thank you for your collaboration.
@miroslavpejic85
I do already have this set:
host: {
protected: true,
user_auth: true,
}
In which case, this would actually be a bug, right?
Kindly ensure that MiroTalk SFU is updated to the latest version.
Did you utilize the same code base as provided in this repository?
However, I have encountered difficulty reproducing the issue as described.
I'm planning to close this for now. If anyone else runs into the same issue with our official source code, feel free to let me know, and I'll be more than happy to reopen it! Your feedback is always valued. Thanks a bunch! 😊
Bug Report
Describe the bug
The token generated by the Token Endpoint, is authenticating users even after it's expiry!
To reproduce
Steps to reproduce the behavior:
roomPassword
body parameter equal totrue
Expected behavior
Authentication should fail.