chore(keycloak): set longer SSO timeout
This commit is contained in:
@@ -576,22 +576,29 @@ show-realm-token-settings realm:
|
|||||||
export KEYCLOAK_REALM={{ realm }}
|
export KEYCLOAK_REALM={{ realm }}
|
||||||
dotenvx run -q -f ../.env.local -- tsx ./scripts/show-realm-token-settings.ts
|
dotenvx run -q -f ../.env.local -- tsx ./scripts/show-realm-token-settings.ts
|
||||||
|
|
||||||
# Update realm token settings (access token lifespan, refresh token lifespan, etc.)
|
# Update realm token settings (access token lifespan, SSO session settings)
|
||||||
update-realm-token-settings realm access_token_lifespan='' refresh_token_lifespan='':
|
update-realm-token-settings realm access_token_lifespan='' sso_session_idle_timeout='' sso_session_max_lifespan='':
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
export ACCESS_TOKEN_LIFESPAN={{ access_token_lifespan }}
|
export ACCESS_TOKEN_LIFESPAN={{ access_token_lifespan }}
|
||||||
export REFRESH_TOKEN_LIFESPAN={{ refresh_token_lifespan }}
|
export SSO_SESSION_IDLE_TIMEOUT={{ sso_session_idle_timeout }}
|
||||||
|
export SSO_SESSION_MAX_LIFESPAN={{ sso_session_max_lifespan }}
|
||||||
while [ -z "${ACCESS_TOKEN_LIFESPAN}" ]; do
|
while [ -z "${ACCESS_TOKEN_LIFESPAN}" ]; do
|
||||||
ACCESS_TOKEN_LIFESPAN=$(
|
ACCESS_TOKEN_LIFESPAN=$(
|
||||||
gum input --prompt="Access token lifespan (in seconds): " --width=100 \
|
gum input --prompt="Access token lifespan (seconds): " --width=100 \
|
||||||
--placeholder="e.g., 43200 for 12 hours" --value="43200"
|
--placeholder="e.g., 43200 for 12 hours" --value="43200"
|
||||||
)
|
)
|
||||||
done
|
done
|
||||||
while [ -z "${REFRESH_TOKEN_LIFESPAN}" ]; do
|
while [ -z "${SSO_SESSION_IDLE_TIMEOUT}" ]; do
|
||||||
REFRESH_TOKEN_LIFESPAN=$(
|
SSO_SESSION_IDLE_TIMEOUT=$(
|
||||||
gum input --prompt="Refresh token lifespan (in seconds): " --width=100 \
|
gum input --prompt="SSO session idle timeout (seconds): " --width=100 \
|
||||||
--placeholder="e.g., 86400 for 24 hours" --value="86400"
|
--placeholder="e.g., 86400 for 1 day" --value="86400"
|
||||||
|
)
|
||||||
|
done
|
||||||
|
while [ -z "${SSO_SESSION_MAX_LIFESPAN}" ]; do
|
||||||
|
SSO_SESSION_MAX_LIFESPAN=$(
|
||||||
|
gum input --prompt="SSO session max lifespan (seconds): " --width=100 \
|
||||||
|
--placeholder="e.g., 604800 for 7 days" --value="604800"
|
||||||
)
|
)
|
||||||
done
|
done
|
||||||
export KEYCLOAK_ADMIN_USER=$(just admin-username)
|
export KEYCLOAK_ADMIN_USER=$(just admin-username)
|
||||||
|
|||||||
@@ -14,13 +14,10 @@ const main = async () => {
|
|||||||
const realmName = process.env.KEYCLOAK_REALM;
|
const realmName = process.env.KEYCLOAK_REALM;
|
||||||
invariant(realmName, "KEYCLOAK_REALM environment variable is required");
|
invariant(realmName, "KEYCLOAK_REALM environment variable is required");
|
||||||
|
|
||||||
// Token lifespan settings (with defaults suitable for JupyterHub)
|
// Token lifespan settings (with defaults suitable for development/personal use)
|
||||||
const accessTokenLifespan = parseInt(process.env.ACCESS_TOKEN_LIFESPAN || "3600"); // 1 hour
|
const accessTokenLifespan = parseInt(process.env.ACCESS_TOKEN_LIFESPAN || "43200"); // 12 hours
|
||||||
const refreshTokenLifespan = parseInt(process.env.REFRESH_TOKEN_LIFESPAN || "14400"); // 4 hours - changed from 30min
|
const ssoSessionIdleTimeout = parseInt(process.env.SSO_SESSION_IDLE_TIMEOUT || "86400"); // 1 day
|
||||||
const ssoSessionMaxLifespan = parseInt(
|
const ssoSessionMaxLifespan = parseInt(process.env.SSO_SESSION_MAX_LIFESPAN || "604800"); // 7 days
|
||||||
process.env.SSO_SESSION_MAX_LIFESPAN || refreshTokenLifespan.toString()
|
|
||||||
); // Use refreshTokenLifespan
|
|
||||||
const ssoSessionIdleTimeout = parseInt(process.env.SSO_SESSION_IDLE_TIMEOUT || "7200"); // 2 hours
|
|
||||||
|
|
||||||
const kcAdminClient = new KcAdminClient({
|
const kcAdminClient = new KcAdminClient({
|
||||||
baseUrl: `https://${keycloakHost}`,
|
baseUrl: `https://${keycloakHost}`,
|
||||||
@@ -49,29 +46,27 @@ const main = async () => {
|
|||||||
// Token lifespan settings
|
// Token lifespan settings
|
||||||
accessTokenLifespan: accessTokenLifespan,
|
accessTokenLifespan: accessTokenLifespan,
|
||||||
accessTokenLifespanForImplicitFlow: accessTokenLifespan,
|
accessTokenLifespanForImplicitFlow: accessTokenLifespan,
|
||||||
|
// SSO session settings
|
||||||
ssoSessionMaxLifespan: ssoSessionMaxLifespan,
|
ssoSessionMaxLifespan: ssoSessionMaxLifespan,
|
||||||
ssoSessionIdleTimeout: Math.min(ssoSessionMaxLifespan, ssoSessionIdleTimeout),
|
ssoSessionIdleTimeout: ssoSessionIdleTimeout,
|
||||||
// Refresh token settings
|
// Refresh token settings
|
||||||
refreshTokenMaxReuse: 0,
|
refreshTokenMaxReuse: 0,
|
||||||
// Offline session settings
|
// Offline session settings
|
||||||
offlineSessionMaxLifespan: ssoSessionMaxLifespan * 2,
|
offlineSessionMaxLifespan: ssoSessionMaxLifespan * 2,
|
||||||
offlineSessionMaxLifespanEnabled: true,
|
offlineSessionMaxLifespanEnabled: true,
|
||||||
// Client session settings
|
// Client session settings (inherit from SSO session)
|
||||||
clientSessionMaxLifespan: accessTokenLifespan,
|
clientSessionMaxLifespan: ssoSessionMaxLifespan,
|
||||||
clientSessionIdleTimeout: Math.min(accessTokenLifespan, ssoSessionIdleTimeout),
|
clientSessionIdleTimeout: ssoSessionIdleTimeout,
|
||||||
});
|
});
|
||||||
console.log(`Realm '${realmName}' created successfully with token settings:`);
|
console.log(`Realm '${realmName}' created successfully with token settings:`);
|
||||||
console.log(
|
console.log(
|
||||||
` - Access Token Lifespan: ${accessTokenLifespan} seconds (${accessTokenLifespan / 60} minutes)`
|
` - Access Token Lifespan: ${accessTokenLifespan}s (${accessTokenLifespan / 3600}h)`
|
||||||
);
|
);
|
||||||
console.log(
|
console.log(
|
||||||
` - Refresh Token Lifespan: ${refreshTokenLifespan} seconds (${refreshTokenLifespan / 60} minutes)`
|
` - SSO Session Idle Timeout: ${ssoSessionIdleTimeout}s (${ssoSessionIdleTimeout / 3600}h)`
|
||||||
);
|
);
|
||||||
console.log(
|
console.log(
|
||||||
` - SSO Session Max: ${ssoSessionMaxLifespan} seconds (${ssoSessionMaxLifespan / 60} minutes)`
|
` - SSO Session Max Lifespan: ${ssoSessionMaxLifespan}s (${ssoSessionMaxLifespan / 86400}d)`
|
||||||
);
|
|
||||||
console.log(
|
|
||||||
` - SSO Session Idle: ${ssoSessionIdleTimeout} seconds (${ssoSessionIdleTimeout / 60} minutes)`
|
|
||||||
);
|
);
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error("An error occurred:", error);
|
console.error("An error occurred:", error);
|
||||||
|
|||||||
@@ -3,13 +3,26 @@
|
|||||||
import KcAdminClient from "@keycloak/keycloak-admin-client";
|
import KcAdminClient from "@keycloak/keycloak-admin-client";
|
||||||
import invariant from "tiny-invariant";
|
import invariant from "tiny-invariant";
|
||||||
|
|
||||||
|
const formatDuration = (seconds: number): string => {
|
||||||
|
if (seconds >= 86400) {
|
||||||
|
return `${seconds}s (${seconds / 86400}d)`;
|
||||||
|
} else if (seconds >= 3600) {
|
||||||
|
return `${seconds}s (${seconds / 3600}h)`;
|
||||||
|
} else {
|
||||||
|
return `${seconds}s (${seconds / 60}m)`;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
const main = async () => {
|
const main = async () => {
|
||||||
const keycloakHost = process.env.KEYCLOAK_HOST;
|
const keycloakHost = process.env.KEYCLOAK_HOST;
|
||||||
const adminUser = process.env.KEYCLOAK_ADMIN_USER;
|
const adminUser = process.env.KEYCLOAK_ADMIN_USER;
|
||||||
const adminPassword = process.env.KEYCLOAK_ADMIN_PASSWORD;
|
const adminPassword = process.env.KEYCLOAK_ADMIN_PASSWORD;
|
||||||
const realm = process.env.KEYCLOAK_REALM;
|
const realm = process.env.KEYCLOAK_REALM;
|
||||||
const accessTokenLifespan = parseInt(process.env.ACCESS_TOKEN_LIFESPAN || "3600");
|
|
||||||
const refreshTokenLifespan = parseInt(process.env.REFRESH_TOKEN_LIFESPAN || "1800");
|
// Token settings with defaults suitable for development/personal use
|
||||||
|
const accessTokenLifespan = parseInt(process.env.ACCESS_TOKEN_LIFESPAN || "43200"); // 12 hours
|
||||||
|
const ssoSessionIdleTimeout = parseInt(process.env.SSO_SESSION_IDLE_TIMEOUT || "86400"); // 1 day
|
||||||
|
const ssoSessionMaxLifespan = parseInt(process.env.SSO_SESSION_MAX_LIFESPAN || "604800"); // 7 days
|
||||||
|
|
||||||
invariant(keycloakHost, "KEYCLOAK_HOST is required");
|
invariant(keycloakHost, "KEYCLOAK_HOST is required");
|
||||||
invariant(adminUser, "KEYCLOAK_ADMIN_USER is required");
|
invariant(adminUser, "KEYCLOAK_ADMIN_USER is required");
|
||||||
@@ -17,12 +30,9 @@ const main = async () => {
|
|||||||
invariant(realm, "KEYCLOAK_REALM is required");
|
invariant(realm, "KEYCLOAK_REALM is required");
|
||||||
|
|
||||||
console.log(`Updating token settings for realm: ${realm}`);
|
console.log(`Updating token settings for realm: ${realm}`);
|
||||||
console.log(
|
console.log(` Access Token Lifespan: ${formatDuration(accessTokenLifespan)}`);
|
||||||
`Access token lifespan: ${accessTokenLifespan} seconds (${accessTokenLifespan / 60} minutes)`
|
console.log(` SSO Session Idle Timeout: ${formatDuration(ssoSessionIdleTimeout)}`);
|
||||||
);
|
console.log(` SSO Session Max Lifespan: ${formatDuration(ssoSessionMaxLifespan)}`);
|
||||||
console.log(
|
|
||||||
`Refresh token lifespan: ${refreshTokenLifespan} seconds (${refreshTokenLifespan / 60} minutes)`
|
|
||||||
);
|
|
||||||
|
|
||||||
const kcAdminClient = new KcAdminClient({
|
const kcAdminClient = new KcAdminClient({
|
||||||
baseUrl: `https://${keycloakHost}`,
|
baseUrl: `https://${keycloakHost}`,
|
||||||
@@ -47,9 +57,9 @@ const main = async () => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
console.log(`Current settings:`);
|
console.log(`Current settings:`);
|
||||||
console.log(` - Access token lifespan: ${currentRealm.accessTokenLifespan} seconds`);
|
console.log(` - Access Token Lifespan: ${formatDuration(currentRealm.accessTokenLifespan || 0)}`);
|
||||||
console.log(` - Refresh token lifespan: ${currentRealm.ssoSessionMaxLifespan} seconds`);
|
console.log(` - SSO Session Idle Timeout: ${formatDuration(currentRealm.ssoSessionIdleTimeout || 0)}`);
|
||||||
console.log(` - SSO session idle: ${currentRealm.ssoSessionIdleTimeout} seconds`);
|
console.log(` - SSO Session Max Lifespan: ${formatDuration(currentRealm.ssoSessionMaxLifespan || 0)}`);
|
||||||
|
|
||||||
await kcAdminClient.realms.update(
|
await kcAdminClient.realms.update(
|
||||||
{ realm },
|
{ realm },
|
||||||
@@ -58,16 +68,17 @@ const main = async () => {
|
|||||||
// Access token settings
|
// Access token settings
|
||||||
accessTokenLifespan: accessTokenLifespan,
|
accessTokenLifespan: accessTokenLifespan,
|
||||||
accessTokenLifespanForImplicitFlow: accessTokenLifespan,
|
accessTokenLifespanForImplicitFlow: accessTokenLifespan,
|
||||||
|
// SSO session settings
|
||||||
|
ssoSessionIdleTimeout: ssoSessionIdleTimeout,
|
||||||
|
ssoSessionMaxLifespan: ssoSessionMaxLifespan,
|
||||||
// Refresh token settings
|
// Refresh token settings
|
||||||
refreshTokenMaxReuse: 0,
|
refreshTokenMaxReuse: 0,
|
||||||
ssoSessionMaxLifespan: refreshTokenLifespan,
|
// Offline session settings
|
||||||
ssoSessionIdleTimeout: Math.min(refreshTokenLifespan, 1800), // Max 30 minutes idle
|
offlineSessionMaxLifespan: ssoSessionMaxLifespan * 2,
|
||||||
// Other token settings
|
|
||||||
offlineSessionMaxLifespan: refreshTokenLifespan * 2,
|
|
||||||
offlineSessionMaxLifespanEnabled: true,
|
offlineSessionMaxLifespanEnabled: true,
|
||||||
// Client session settings
|
// Client session settings (inherit from SSO session)
|
||||||
clientSessionMaxLifespan: accessTokenLifespan,
|
clientSessionMaxLifespan: ssoSessionMaxLifespan,
|
||||||
clientSessionIdleTimeout: Math.min(accessTokenLifespan, 1800),
|
clientSessionIdleTimeout: ssoSessionIdleTimeout,
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -75,9 +86,9 @@ const main = async () => {
|
|||||||
|
|
||||||
const updatedRealm = await kcAdminClient.realms.findOne({ realm });
|
const updatedRealm = await kcAdminClient.realms.findOne({ realm });
|
||||||
console.log(`Updated settings:`);
|
console.log(`Updated settings:`);
|
||||||
console.log(` - Access token lifespan: ${updatedRealm?.accessTokenLifespan} seconds`);
|
console.log(` - Access Token Lifespan: ${formatDuration(updatedRealm?.accessTokenLifespan || 0)}`);
|
||||||
console.log(` - Refresh token lifespan: ${updatedRealm?.ssoSessionMaxLifespan} seconds`);
|
console.log(` - SSO Session Idle Timeout: ${formatDuration(updatedRealm?.ssoSessionIdleTimeout || 0)}`);
|
||||||
console.log(` - SSO session idle: ${updatedRealm?.ssoSessionIdleTimeout} seconds`);
|
console.log(` - SSO Session Max Lifespan: ${formatDuration(updatedRealm?.ssoSessionMaxLifespan || 0)}`);
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error("✗ Failed to update realm token settings:", error);
|
console.error("✗ Failed to update realm token settings:", error);
|
||||||
process.exit(1);
|
process.exit(1);
|
||||||
|
|||||||
Reference in New Issue
Block a user