-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identity uses browser time, not server time to sign JWTs #43
Comments
There's no way to fix this because Identity doesn't have a backend server to talk to and we don't want to add any server-side dependencies. |
I'm open to increasing the token expiry time or allowing the requester to specify an expiry time |
Understood, and thank you. |
After further thought, I feel this strictness is a good thing. Ensures all parties are in agreeance of the current time. Apologies! |
I think we should increase the token expiry time to account for clock skew. 10-30 minutes seems reasonable |
Increased to 10 minutes: d79b17c |
Steps to reproduce:
Use a Windows PC
The text was updated successfully, but these errors were encountered: