You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As I understand it, refreshing the cookies requires the browser to acquire a new challenge, sign it, and then present it
While the server can respond with a Sec-Session-Challenge header at any time, the logic to generate the challenge will be at the /securesession endpoint, not at other server end points
when responding to POST /securesession/start or POST /securesession/refresh, the server could include Sec-Session-Reffresh headers that have the same content as the Sec-Session-Challenge headers -- and the challenge and optional authorization would be used on the next refresh, removing one round trip in a refresh cycle
The text was updated successfully, but these errors were encountered:
So a similar pattern to rotating refresh tokens. Folks were discussing other options for reducing round trips in #12--you could add something like this to the simplified flow proposed there. It might further complicate handling concurrency once you move the logic out of the "special" registration endpoints but it shouldn't be insurmountable.
As I understand it, refreshing the cookies requires the browser to acquire a new challenge, sign it, and then present it
While the server can respond with a
Sec-Session-Challenge
header at any time, the logic to generate the challenge will be at the/securesession
endpoint, not at other server end pointswhen responding to
POST /securesession/start
orPOST /securesession/refresh
, the server could includeSec-Session-Reffresh
headers that have the same content as theSec-Session-Challenge
headers -- and the challenge and optional authorization would be used on the next refresh, removing one round trip in a refresh cycleThe text was updated successfully, but these errors were encountered: