-
Notifications
You must be signed in to change notification settings - Fork 10.4k
Indicates that SaveTokens is not supported for WsFederation #10763
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Does this really prevent the base class intellisense from showing up? The reference assemblies need to be updated because you added public API.
|
I believe it will as long as the variable you are dereferencing is actually of the derived type ( @Kahbazi could you verify this and post a quick screenshot? |
Nice. And if you type in SaveTokens manually and hover over it does the right test come up? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Very nice! Thanks @Kahbazi ! We should be able to take it from here.
Why not implementing proper |
@PinpointTownes What would you save? I was under the impression that the wsfed token wasn't useful beyond sign-in. |
This comment was made automatically. If there is a problem contact [email protected]. I've triaged the above build. I've created/commented on the following issue(s) |
The
Keeping the WS-Fed token is definitely useful for delegation or impersonation scenarios (aka ActAs and OnBehalfOf), where the client will want to "exchange" the initial WS-Fed token with a token it can use itself to access protected resources (typically a WCF service or a REST API). In the old world, this was achieved by setting In the new world, it would make sense to store the WS-Fed token as an authentication property, exactly like what the OIDC/OAuth handlers do with access, identity and refresh tokens. |
@PinpointTownes Reading through the prior thread (aspnet/Security#1716 (comment)) it ended because the tokens were too large and caused the cookie to hit header size limits. I'm merging this change for now and we can revisit if there's enough interest in those tokens. |
#7955