Skip to content

Commit f8c1c7c

Browse files
Merge pull request #3 from himeshsiriwardana/pr-5536
minor modification to the content and file name
2 parents da77ce3 + 2212518 commit f8c1c7c

File tree

3 files changed

+23
-27
lines changed

3 files changed

+23
-27
lines changed
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Generate JSON Web Tokens without revoking existing tokens
2+
3+
When WSO2 Identity Server receives a request to generate a new JSON Web Token (JWT), it issues a token based on the application, user, scope, and binding combination. If the server receives another request for the same combination, it revokes the existing token and returns a new one.
4+
5+
If you want to generate a JWT without revoking the existing token, add and configure the following property in the `<IS_HOME>/repository/conf/deployment.toml` file.
6+
7+
```toml
8+
[oauth.jwt.renew_token_without_revoking_existing]
9+
enable = true
10+
```
11+
12+
!!! Note
13+
This feature supports token requests with the `client_crendetials` grant type by default. If you need to enable for other grant types, add the following configuration to the same `<IS_HOME>/repository/conf/deployment.toml` file.
14+
15+
```toml
16+
[oauth.jwt.renew_token_without_revoking_existing]
17+
enable = true
18+
allowed_grant_types = ["client_credentials","password", ...]
19+
```
20+
21+
!!! Warning
22+
Enabling this feature could lead to an exponential growth of tokens. Make sure to configure token clean up scripts with proper time limits. See [Remove Unused Tokens from the Database]({{base_path}}/deploy/remove-unused-tokens-from-the-database/) for details.

en/identity-server/next/docs/deploy/jwt-token-generation-without-revoking-existing-tokens.md

Lines changed: 0 additions & 26 deletions
This file was deleted.

en/identity-server/next/mkdocs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -833,7 +833,7 @@ nav:
833833
- Token persistence: deploy/token-persistence.md
834834
- Remove unused tokens from the database: deploy/remove-unused-tokens-from-the-database.md
835835
- Enable assertions in access tokens: deploy/enable-assertions-in-access-tokens.md
836-
- JWT token generation without revoking existing tokens: deploy/jwt-token-generation-without-revoking-existing-tokens.md
836+
- Generate JWT tokens without revoking existing tokens: deploy/generate-jwt-tokens-without-revoking-existing-tokens.md
837837
#- Configure rsync for Deployment Synchronization: deploy/configuring-rsync-for-deployment-synchronization.md
838838
- Enable hostname verification: deploy/enable-hostname-verification.md
839839
- Transport Level Security:

0 commit comments

Comments
 (0)