Skip to content

Add signed JWT auto sign-in flow (LibreGraph.SignedLoginOK)#233

Merged
longsleep merged 1 commit intolibregraph:masterfrom
longsleep-io:longsleep-signed-login
Mar 27, 2026
Merged

Add signed JWT auto sign-in flow (LibreGraph.SignedLoginOK)#233
longsleep merged 1 commit intolibregraph:masterfrom
longsleep-io:longsleep-signed-login

Conversation

@longsleep
Copy link
Copy Markdown
Collaborator

When --allow-client-signed-logins is enabled, trusted apps can sign in users without an interactive password challenge by sending an OIDC authorization request that includes the LibreGraph.SignedLoginOK scope together with a signed request object carrying a preferred_username claim.

The signed login path is built directly into IdentifierIdentityManager:

  • checkAndRecordJTI: in-memory JTI replay prevention (10 min window)
  • authenticateSignedLogin: validates the signed JWT, looks up the user by preferred_username, writes a logon cookie so subsequent silent-renew and re-auth requests succeed via the normal cookie path without needing a new signed JWT each time
  • authorizeSignedLogin: verifies client identity against the signed request object and approves scopes via the client's trusted_scopes list

WriteLogonCookie is introduced on Identifier to write the cookie mid-flow without firing onSetLogonCallbacks (which would produce a spurious browser-state cookie header in the same response). SetUserToLogonCookie is refactored to delegate to it.

When --allow-client-signed-logins is enabled, trusted apps can sign in
users without an interactive password challenge by sending an OIDC
authorization request that includes the LibreGraph.SignedLoginOK scope
together with a signed request object carrying a preferred_username claim.

The signed login path is built directly into IdentifierIdentityManager:

- checkAndRecordJTI: in-memory JTI replay prevention (10 min window)
- authenticateSignedLogin: validates the signed JWT, looks up the user
  by preferred_username, writes a logon cookie so subsequent silent-renew
  and re-auth requests succeed via the normal cookie path without needing
  a new signed JWT each time
- authorizeSignedLogin: verifies client identity against the signed
  request object and approves scopes via the client's trusted_scopes list

WriteLogonCookie is introduced on Identifier to write the cookie
mid-flow without firing onSetLogonCallbacks (which would produce a
spurious browser-state cookie header in the same response).
SetUserToLogonCookie is refactored to delegate to it.
@longsleep longsleep force-pushed the longsleep-signed-login branch from 27ba0ea to 877c934 Compare March 27, 2026 15:40
@longsleep longsleep self-assigned this Mar 27, 2026
@longsleep longsleep added the enhancement New feature or request label Mar 27, 2026
@longsleep longsleep merged commit a85d812 into libregraph:master Mar 27, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant