zuul/doc/source/developer/specs
Matthieu Huin b599c7249d authentication config: add optional max_validity_time, skew
The Zuul admin can configure authenticators with an optional
"max_validity_time" field, which is the maximum age in seconds
for a valid authentication token. By default there is no
maximum age set for tokens, except the one deduced from
the token's "exp" claim.
If "max_validity" is set, tokens without an "iat" claim will
be rejected.

This is meant as an extra security to avoid accidentally issueing
very long lived tokens through the CLI.

The "skew" field can be used to mitigate clocks discrepancies
between Zuul and a JWT emitter.

Change-Id: I9351ca016b60050b5f3b3950b840d5f719e919ce
2019-12-10 16:39:29 +01:00
..
container-build-resources.rst Add container spec 2018-07-23 08:34:04 -07:00
index.rst Spec: Add a Kubernetes Operator for Zuul 2019-07-09 07:39:12 -04:00
kubernetes-operator.rst Spec: Add a Kubernetes Operator for Zuul 2019-07-09 07:39:12 -04:00
logs.rst Add logs spec 2019-03-29 08:51:31 -07:00
multiple-ansible-versions.rst Add spec for multi ansible version support 2019-02-04 07:24:47 +01:00
tenant-scoped-admin-web-API.rst authentication config: add optional max_validity_time, skew 2019-12-10 16:39:29 +01:00