You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/aspnet-identity/schemes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ IdentityServer always uses the `"idsrv.external"` scheme here, available in the
62
62
IdentityServer session management requires a separate cookie to monitor the session state without sending the large authentication cookie.
63
63
The [User Session Service](/identityserver/reference/services/user-session-service.md) manages this cookie.
64
64
65
-
-**Default Name:**`"idsrv.session"` (Constant: `IdentityServerConstants.DefaultCheckSessionCookieName`). This often remains consistent, but verify your specific configuration.
Note this cookie is not marked as `HttpOnly`, so it can be accessed in client-side code. The JavaScript code that is required to check user sessions in the background also requires access to this cookie, and needs it to be `HttpOnly`.
Copy file name to clipboardExpand all lines: src/content/docs/identityserver/ui/server-side-sessions/inactivity-timeout.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,13 +37,12 @@ These invocations can be used as the signal to the server-side session managemen
37
37
In addition to refresh tokens, any client activity using an access token that originated from the user's session could also be used to extend the user's server-side session at IdentityServer.
38
38
This would only work if IdentityServer were aware of this activity, but userinfo and introspection endpoint requests are examples of those types of activity.
39
39
40
-
Internally IdentityServer provides a `ISessionCoordinationService` which is invoked from the endpoints describes above.
41
-
Its purpose is to then extend the lifetime of the server-side session.
40
+
Internally IdentityServer provides a `ISessionCoordinationService` which is invoked from the endpoints describes above.
41
+
Its purpose is to then extend the lifetime of the server-side session.
42
42
Below is a picture of the various types of requests to do this:
43
43
44
44

45
45
46
-
47
46
### User Inactivity Detection and Session Termination
48
47
49
48
When the user becomes inactive, the server-side session management system at IdentityServer can detect and remove the abandoned session.
@@ -58,7 +57,6 @@ The obvious signal would be if the refresh token request failed, then that would
58
57
59
58
Given this understanding, client applications can participate in this convention and IdentityServer can coordinate to achieve this system-wide "inactivity timeout" requirement.
60
59
61
-
62
60
## Configuration
63
61
64
62
Configuration is needed in both IdentityServer and client applications.
@@ -71,7 +69,6 @@ To prepare IdentityServer, these features need to be enabled:
71
69
2. Either the global [`CoordinateClientLifetimesWithUserSession` option](/identityserver/reference/options.md#authentication) should be enabled, or the client-specific [`CoordinateLifetimeWithUserSession` option](/identityserver/reference/models/client.md#authentication--session-management) should be enabled.
72
70
3. Enable back-channel logout for [session expiration](/identityserver/ui/server-side-sessions/session-expiration.mdx) with the [`ExpiredSessionsTriggerBackchannelLogout` option](/identityserver/reference/options.md#server-side-sessions).
73
71
74
-
75
72
### Client Applications
76
73
77
74
Depending on what protocol features the client is using, different approaches will need to be taken.
@@ -83,6 +80,7 @@ As the client uses the refresh token at IdentityServer, the user's session expir
83
80
Be sure to configure the access token lifetime to be less than the server-side session lifetime at IdentityServer.
84
81
85
82
To detect inactivity:
83
+
86
84
* Either handle refresh token request failure, and consider the session ended.
87
85
* Or implement back-channel logout.
88
86
@@ -91,7 +89,8 @@ To detect inactivity:
91
89
It's possible a client is using a [reference access token](/identityserver/tokens/reference.md) and no refresh token.
92
90
The API would then use introspection to validate the token, which would then extend the associated user's session at IdentityServer.
93
91
94
-
To detect inactivity:
92
+
To detect inactivity:
93
+
95
94
* Either handle 401 errors from the API, and then consider the session ended.
"content": "<strong>Livestream:</strong> Why now's a good time to upgrade to .NET 10 and Duende IdentityServer 7. <a href=\"https://duendesoftware.com/webinars/why-upgrade-dotnet-10-and-identityserver\">Register Now!</a>"
2
+
"content": "<strong>Livestream:</strong> Why now's a good time to upgrade to Duende IdentityServer and .NET 10. <a href=\"https://duendesoftware.com/webinars/why-upgrade-dotnet-10-and-identityserver\">Register Now!</a>"
0 commit comments