Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SL1 - how to let IdP dictate RP session lifetime in OpenID Connect #60

Open
aaronpk opened this issue Mar 7, 2025 · 4 comments
Open
Labels

Comments

@aaronpk
Copy link
Collaborator

aaronpk commented Mar 7, 2025

SAML defines the SessionNotOnOrAfter claim to give the IdP a way to tell the RP how long to set the session as a timestamp. There is no equivalent claim currently defined in OpenID Connect.

We should decide whether to define this as an OpenID Connect extension in the AB working group, or just define a new ID token claim in IPSIE.

@aaronpk aaronpk added the sl1 label Mar 7, 2025
@aaronpk aaronpk changed the title SL1 - how to indicate SessionNotOnOrAfter in OpenID Connect SL1 - how to let IdP dictate RP session lifetime in OpenID Connect Mar 7, 2025
@mcguinness
Copy link

I think we need to see if there will be additional policy directives we want to convey from Enterprise IdP to RP or if its limited to max session lifetime. If there is a need for a more general way to convey a policy directive/obligation, then solving in the AB working group would make sense to me as an extension. An IdP evaluating a conditional access policy for example may want to constrain the downstream session is a specific way such as:

  • limited security context/read only for an unmanaged device for a user who could have full context access on a managed device
  • idle vs max session lifetime
  • transient vs persistent session cookies
  • online-only session vs allowing session to create offline access (e.g. issue a refresh token)
  • require device-bound session or token (token protection level)
  • MFA/assurance level TTL

If we just want to keep this requirement focused to max session lifetime and can define the boundary of of "session", then I could see us just defining the claim as part of IPSIE profile and conformance.

Curious what the group thinks

@dickhardt
Copy link
Contributor

Would IPSIE specify a maximum session lifetime?

@aaronpk
Copy link
Collaborator Author

aaronpk commented Mar 10, 2025

I would steer away from policy decisions like this within IPSIE, and stick to enabling enforcement of the IdP and RP policies between each other.

@dhs-BI
Copy link
Contributor

dhs-BI commented Mar 11, 2025

This makes sense to me. There's a rich set of directives that might be expressed. I look forward to discussing this further to see whether it has a home in AB.

If there is a need for a more general way to convey a policy directive/obligation, then solving in the AB working group would make sense to me as an extension. An IdP evaluating a conditional access policy for example may want to constrain the downstream session is a specific way such as:

  • limited security context/read only for an unmanaged device for a user who could have full context access on a managed device
  • idle vs max session lifetime
  • transient vs persistent session cookies
  • online-only session vs allowing session to create offline access (e.g. issue a refresh token)
  • require device-bound session or token (token protection level)
  • MFA/assurance level TTL
    ...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants