-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Add exp
to generated user JWTs
#35
Comments
exp
to generated user JWTsexp
to generated user JWTs
Additionally, the expiration time should be checked in the refresh loop so that the stored JWT can be updated before it expires: vault-plugin-secrets-nats/backend.go Line 282 in 86002ee
It seems like it would be good to refresh it when it is >= 50% of the way between |
You are right. Thanks for reporting this! Token expiration is not implemented as this has not been a use case for us yet. Since I'm no longer working full time on all these projects, I'll look into this issue when I have some time. PRs are very welcome though :) |
@siredmar Thanks for the confirmation. We ended up not going with this plugin, otherwise would be happy to add the PR. For our use case, we didn't need multi-tenancy, just dynamic credentials, and we were able to just use mTLS NATS auth with the Vault PKI backend. |
Great plugin!
We'd like to use it to generate temporary credentials for our NATS clusters.
Unfortunately, the JWTs generated by this function do not have the
exp
set so they are essentially perpetual.It looks like
exp
support is already present and just requires being added similar toiss
here.The text was updated successfully, but these errors were encountered: