Nonce update for token refresh (#32081)
parent
bc8e0dfe75
commit
c82db3ac5a
|
@ -570,6 +570,14 @@ The important changes to the `LogInOrOut` component are demonstrated in the foll
|
|||
</div>
|
||||
```
|
||||
|
||||
## Cryptographic nonce
|
||||
|
||||
A *nonce* is a string value that associates a client's session with an ID token to mitigate [replay attacks](https://developer.mozilla.org/docs/Glossary/Replay_attack).
|
||||
|
||||
If you receive a nonce error during authentication development and testing, use a new InPrivate/incognito browser session for each test run, no matter how small the change made to the app or test user because stale cookie data can lead to a nonce error. For more information, see the [Cookies and site data](#cookies-and-site-data) section.
|
||||
|
||||
A nonce isn't required or used when a refresh token is exchanged for a new access token. In the sample app, the `CookieOidcRefresher` (`CookieOidcRefresher.cs`) deliberately sets <xref:Microsoft.IdentityModel.Protocols.OpenIdConnect.OpenIdConnectProtocolValidator.RequireNonce?displayProperty=nameWithType> to `false`.
|
||||
|
||||
## Troubleshoot
|
||||
|
||||
[!INCLUDE[](~/blazor/security/includes/troubleshoot-server.md)]
|
||||
|
|
Loading…
Reference in New Issue