[ 
https://issues.apache.org/jira/browse/NIFI-4890?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17678828#comment-17678828
 ] 

David Handermann commented on NIFI-4890:
----------------------------------------

Thanks for the detailed comment and analysis [~ruckc], that is a very good 
summary of the issues involved.

I agree that the current authentication and authorization architecture does not 
fit well with externalized providers, such as OIDC and SAML. I have reworked 
the internal JWT processing, and more recently refactored the SAML integration. 
Having refactored the JWT processing, I could see potential extension points to 
make the NiFi UI work as public OAuth2 client, as opposed to the current 
approach where the web application is a confidential OAuth2 client. As you 
noted, this would require both UI and server-side changes.

The current focus for NiFi 2.0 is technical debt reduction, so redesigning the 
authentication and authorization process is not part of the current plan for 
2.0. With the wide variety of authentication and authorization strategies 
available in NiFi, the ideal solution would provide a migration path that 
continues to support all of the current integration options.

With that background, something along the lines of option 2 seems like the best 
approach for now. This would should eliminate some aspects of the existing 
custom code, while retaining the general approach of exchanging and OIDC Access 
Token for a NiFi JWT, and using the OIDC Refresh Token to obtain a new OIDC 
Access Token as needed. With this change in place, moving in the direction of 
option 3 seems like a good subsequent step.

> OIDC Token Refresh is not done correctly
> ----------------------------------------
>
>                 Key: NIFI-4890
>                 URL: https://issues.apache.org/jira/browse/NIFI-4890
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Core UI
>    Affects Versions: 1.5.0
>         Environment: Environment:
> Browser: Chrome / Firefox 
> Configuration of NiFi: 
> - SSL certificate for the server (no client auth) 
> - OIDC configuration including end_session_endpoint (see the link 
> https://auth.s.orchestracities.com/auth/realms/default/.well-known/openid-configuration)
>  
>            Reporter: Federico Michele Facca
>            Assignee: David Handermann
>            Priority: Major
>         Attachments: image-2022-10-20-12-23-38-675.png
>
>
> It looks like the NIFI UI is not refreshing the OIDC token in background, and 
> because of that, when the token expires, tells you that your session is 
> expired. and you need to refresh the page, to get a new token.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to