patch session length settings

This commit is contained in:
adamscmRH
2018-06-25 14:39:04 -04:00
parent 380df1b327
commit b5dc3e6b94
6 changed files with 20 additions and 9 deletions

View File

@@ -49,7 +49,7 @@
* Impose stricter criteria to admin users - organization admin role now
necessary for all organizations target user is member of.
* Remove unused `admin_role` associated with users.
* Enforce max value for `SESSION_COOKIE_AGE`
* Enforce max value for `AUTH_TIMEOUT_EXPIRATION`
[[#1651](https://github.com/ansible/awx/issues/1651)].
* Add stricter validation to `order_by` query params
[[#776](https://github.com/ansible/awx/issues/776)].

View File

@@ -45,7 +45,7 @@ Any client should follow the standard rules of [cookie protocol](https://tools.i
parse that header to obtain information about the session, such as session cookie name (`session_id`),
session cookie value, expiration date, duration, etc.
The duration of the cookie is configurable by Tower Configuration setting `SESSION_COOKIE_AGE` under
The duration of the cookie is configurable by Tower Configuration setting `AUTH_TOKEN_EXPIRATION` under
category `authentication`. It is an integer denoting the number of seconds the session cookie should
live. The default session cookie age is 2 weeks.
@@ -76,7 +76,7 @@ is updated, all sessions she owned will be invalidated and deleted.
* User should be able to log in via `/api/login/` endpoint by correctly providing all necessary fields.
* Logged in users should be able to authenticate themselves by providing correct session auth info.
* Logged in users should be able to log out via `/api/logout/`.
* The duration of a session cookie should be configurable by `SESSION_COOKIE_AGE`.
* The duration of a session cookie should be configurable by `AUTH_TOKEN_EXPIRATION`.
* The maximum number of concurrent login for one user should be configurable by `SESSIONS_PER_USER`,
and over-limit user sessions should be warned by websocket.
* When a user's password is changed, all her sessions should be invalidated and deleted.