Automatic silent renew deletes profile from stored state
See original GitHub issueHello,
I noticed that the property profile
of the object stored inside the session storage is overwritten when a silent renew is triggered. It looks like the response of the silent renew just overwrites the whole object.
State stored in session storage after signin with redirect callback:
State stored in session storage after first silent renew:
I also enabled the option loadUserInfo
of the UserManager, but the silent renew doesn’t seem to respect it.
It would be great if the stored profile would remain in place even after the silentRenew.
Issue Analytics
- State:
- Created 2 years ago
- Comments:16 (6 by maintainers)
Top Results From Across the Web
automaticSilentRenew is not working... · Issue #53 - GitHub
Hi ,. Great library! The automaticSilentRenew is not functioning. I setup my javascript similar to the provided sample.
Read more >ASP.NET Core, C#, IdentityServer4, oidc-client - Silent Renew
Today we implement the ground work needed for silent refreshing of our tokens from our nuxtjs application using the oidc-client ...
Read more >Delprof2 – User Profile Deletion Tool - Helge Klein
Delprof2 lets you explicitly specify which profiles to delete; Delprof2 bypasses security to delete profiles regardless of current permissions/ ...
Read more >react-oidc-context - npm
To renew the access token, the automatic silent renew feature of oidc-client-ts can be used.
Read more >Authentication State Persistence | Firebase - Google
Indicates that the state will only be stored in memory and will be cleared when the window or activity is refreshed. Modifying the...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Idea: We could remove:
and change the “if” code to:
_filterProtocolClaims
should be fine for !isOpenId…The reason that hacking
openid
back onto the scope returned in the response isn’t ideal is given here: https://www.oauth.com/oauth2-servers/access-tokens/refreshing-access-tokens/I think the better behavior here might be to simply discard the scope sent back from the IDP and just preserve the scope used in the original request?