generated from amazon-archives/__template_MIT-0
-
Notifications
You must be signed in to change notification settings - Fork 73
Open
Description
Description:
The credential provider caches AWS STS credentials and a monitoring token, but does not cache and reuse the OIDC id_token for silent credential refresh.
Current flow when AWS credentials expire:
- Cached AWS credentials checked → expired.
- Full browser-based OIDC authentication triggered (browser popup).
- New
id_tokenexchanged for AWS credentials via STS. - AWS credentials cached.
The id_token typically has a longer validity (e.g., 1 hour) than the STS credential refresh cycle. When AWS credentials expire but the id_token is still valid, the provider should reuse the cached id_token to silently obtain new AWS credentials without a browser popup.
Expected behavior:
- Cache the OIDC
id_tokenalongside itsexpclaim. - On credential refresh, check if a cached
id_tokenis still valid before launching browser auth. - If valid, use it directly with
AssumeRoleWithWebIdentity/ Cognito Identity Pool for silent refresh. - Only trigger browser-based auth when the
id_tokenitself has expired.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels