That makes somewhat more sense to me if we’re talking about applications with 
sticky sessions. Adding a session-specific logout URI introduces security 
concerns (e.g. how does the OP validate the URI) and only works if the RP can 
provide URIs that target individual hosts in their fleet. The “is this SID 
valid?” endpoint solution that David described doesn’t scale and depends on SID 
(which is OPTIONAL). Both shift the burden of state management onto the OP, 
which may not be in any better position to handle it.

This seems like something that needs to be addressed in the client 
implementations rather than in the specification. Especially when we consider 
that there are implementation-specific questions lurking in the edge cases. 
(e.g. what happens when a user comes in with valid cookies, but no server-side 
session state?)

--
Annabelle Richard Backman
Amazon – Identity Services

From: Bill Burke <bbu...@redhat.com>
Date: Wednesday, March 28, 2018 at 12:10 PM
To: "Richard Backman, Annabelle" <richa...@amazon.com>
Cc: Mike Jones <michael.jo...@microsoft.com>, Roberto Carbone <carb...@fbk.eu>, 
"oauth@ietf.org" <oauth@ietf.org>, Nat Sakimura <n...@sakimura.org>
Subject: Re: [OAUTH-WG] What Does Logout Mean?



On Wed, Mar 28, 2018 at 1:40 PM, Richard Backman, Annabelle 
<richa...@amazon.com<mailto:richa...@amazon.com>> wrote:

I'm reminded of this session from IIW 
21<http://iiw.idcommons.net/What_Does_%E2%80%9CLogOUT%E2%80%99_mean%3F>. ☺ I 
look forward to reading the document distilling the various competing use cases 
and requirements into some semblance of sanity.



> If the framework has no way of invalidating a session across the cluster…



Is this a common deficiency in application frameworks? It seems to me that much 
of the value of a server-side session record is lost if its state isn’t 
synchronized across the fleet.


"modern" apps are REST based with Javascript frontends, but there's still a ton 
of "old school" developers out there.

Was involved with developing an application server for over a decade 
(JBoss)...There were many app developers that didn't want to store app session 
information in a database (as David says) or deal with the headaches of session 
replication so they just set up their load balancer to do session affinity 
(sticky sessions).  That way the login session was always local.  If the oidc 
logout spec allowed the client to register logout callback tied to the token's 
session (like maybe during code to token), that might be a simple way to solve 
many of these issues too.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to