Skip to content

Token Lifetimes and Security in OAuth 2.0: Note clarification on long lived tokens and Service to Service communication #132

@dbfr3qs

Description

@dbfr3qs

Hi there, firstly thanks for the fantastic overview on all things OAuth2 tokens - I've really enjoyed reading it so far.

I've been struggling to make sense of the note under Service to Service communications when discussing the use of long lived access tokens and would like to seek clarification.

To quote the entire passage:

In certain system-to-system communications where services need to interact with each other in a highly trusted environment (e.g., within the same enterprise or data center), long-lived tokens can reduce the need for frequent authentication and authorization exchanges. This makes service communication more efficient.

Use case: Within microservice architectures in secure internal networks, long-lived tokens can facilitate inter-service communication without requiring frequent re-authentication.

Note: This use can also be solved by using short-lived tokens that leverage client_secret_jwt or private_key_jwt as defined in the OpenID Connect Core specification.

The note is what confuses me and I think I may be missing something fundamental. As far as the client type in use, are we discussing client credential clients (that is my assumption when talking about service to service communication)? If so, how does using shorter lived tokens with those specific authentication methods solve this particular use case? Clients could use those authentication methods and still make use of longer lived tokens.

Apologies if this is obvious but I'm genuinely unable to figure it out.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions