Closed NilukaSripalim closed 1 day ago
Analysis
The tokens are being revoked since the tokens will have the scopes mapped to relevant permissions which could have been assigned to the user by adding the user to the specific group. To remove those permissions, all the active tokens are being revoked.
Hence this behaviour is expected, reducing the priority of the issue. Further discussed has to be conducted.
FYI @hasanthiP
Observations in IS 6.1
Consider that the admin user has logged in to the console.
Observations in IS 7.0
Fix for this issue: Even through the implementation to terminate the session is already implemented with [1], the relevant events are not subscribed for the event handler.
Issue [2] has been created to track this issue.
[1] https://github.com/wso2-extensions/identity-inbound-auth-oauth/pull/2198 [2] https://github.com/wso2/product-is/issues/18813
Ideally, none of the tokens should be invalidated when an admin user is removed from a certain group. However, when a user's groups are updated, all of the tokens are revoked due to the way we have implemented this. It appears that after the user and group roles are separated, the token revocation process is not being handled correctly. We need to fix this with a proper evaluation.
This issue is being closed due to extended inactivity. Please feel free to reopen it if further attention is needed. Thank you for helping us keep the issue list relevant and focused!
Describe the issue: After adding more than two users to a group, attempting to remove more than two users from the group sequentially results in a session expiry.
How to reproduce:
Expected behavior: The removal of users from the group should not result in a session expiry.
Environment information (Please complete the following information; remove any unnecessary fields) :
group-session.webm