Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
devel:documentation:security [2019/02/01 13:08] – admin guide section kotisovam | devel:documentation:security [2025/07/28 12:45] (current) – [Authorization and JWT token] kopro | ||
---|---|---|---|
Line 31: | Line 31: | ||
* iat - issued at date | * iat - issued at date | ||
- | All IdM JWT tokens are signed using HMAC256 algorithm. The symmetric encryption key is configuration property of CzechIdM, stored as " | + | All IdM JWT tokens are signed using HMAC256 algorithm. The symmetric encryption key is configuration property of CzechIdM, stored as " |
+ | |||
Backend of CzechIdM supports immediate detection of user's authorization change. Each modification type is implemented as application event processor, for further details please check the source code and tests :) When user's authorization changes, then persisted tokens, which user owns, are disabled => user is logged out. Types of modifications: | Backend of CzechIdM supports immediate detection of user's authorization change. Each modification type is implemented as application event processor, for further details please check the source code and tests :) When user's authorization changes, then persisted tokens, which user owns, are disabled => user is logged out. Types of modifications: | ||
Line 39: | Line 40: | ||
* role's permissions change - revokes tokens of all users which have the role assigned | * role's permissions change - revokes tokens of all users which have the role assigned | ||
- | ===== Admin guide (to be completed) ===== | ||
- | * [[.adm: | ||
===== Devel Guide ===== | ===== Devel Guide ===== |