zitadel/internal/api/grpc/management
Livio Spring 041af26917
feat(OIDC): add back channel logout (#8837)
# Which Problems Are Solved

Currently ZITADEL supports RP-initiated logout for clients. Back-channel
logout ensures that user sessions are terminated across all connected
applications, even if the user closes their browser or loses
connectivity providing a more secure alternative for certain use cases.

# How the Problems Are Solved

If the feature is activated and the client used for the authentication
has a back_channel_logout_uri configured, a
`session_logout.back_channel` will be registered. Once a user terminates
their session, a (notification) handler will send a SET (form POST) to
the registered uri containing a logout_token (with the user's ID and
session ID).

- A new feature "back_channel_logout" is added on system and instance
level
- A `back_channel_logout_uri` can be managed on OIDC applications
- Added a `session_logout` aggregate to register and inform about sent
`back_channel` notifications
- Added a `SecurityEventToken` channel and `Form`message type in the
notification handlers
- Added `TriggeredAtOrigin` fields to `HumanSignedOut` and
`TerminateSession` events for notification handling
- Exported various functions and types in the `oidc` package to be able
to reuse for token signing in the back_channel notifier.
- To prevent that current existing session termination events will be
handled, a setup step is added to set the `current_states` for the
`projections.notifications_back_channel_logout` to the current position

- [x] requires https://github.com/zitadel/oidc/pull/671

# Additional Changes

- Updated all OTEL dependencies to v1.29.0, since OIDC already updated
some of them to that version.
- Single Session Termination feature is correctly checked (fixed feature
mapping)

# Additional Context

- closes https://github.com/zitadel/zitadel/issues/8467
- TODO:
  - Documentation
  - UI to be done: https://github.com/zitadel/zitadel/issues/8469

---------

Co-authored-by: Hidde Wieringa <hidde@hiddewieringa.nl>
2024-10-31 15:57:17 +01:00
..
integration_test chore: improve integration tests (#8727) 2024-10-17 21:20:57 +00:00
actions_converter.go refactor: rename package errors to zerrors (#7039) 2023-12-08 15:30:55 +01:00
actions.go fix: error handling to prevent panics (#8248) 2024-07-04 14:11:06 +00:00
auth_checks.go refactor: rename package errors to zerrors (#7039) 2023-12-08 15:30:55 +01:00
custom_text_converter.go feat: invite user link (#8578) 2024-09-11 10:53:55 +00:00
custom_text.go feat: invite user link (#8578) 2024-09-11 10:53:55 +00:00
flow.go refactor: rename package errors to zerrors (#7039) 2023-12-08 15:30:55 +01:00
iam.go fix(query): realtime data on defined requests (#3726) 2022-06-14 07:51:00 +02:00
idp_converter_test.go feat: V2 alpha import and export of organizations (#3798) 2022-07-28 13:42:35 +00:00
idp_converter.go feat(saml): allow setting nameid-format and alternative mapping for transient format (#7979) 2024-05-23 05:04:07 +00:00
idp.go fix: generalise permission check for query user information (#8458) 2024-08-23 06:44:18 +00:00
information.go feat: trusted (instance) domains (#8369) 2024-07-31 18:00:38 +03:00
language.go refactor(fmt): run gci on complete project (#7557) 2024-04-03 10:43:43 +00:00
oneof.go feat: protos refactoring 2021-03-09 10:30:11 +01:00
org_converter.go fix(api): correct mapping of metadata queries (#7609) 2024-03-21 14:56:58 +00:00
org.go feat: org v2 ListOrganizations (#8411) 2024-08-15 06:37:06 +02:00
policy_label_converter.go feat: add attribute to only enable specific themes (#6798) 2023-10-26 05:54:09 +00:00
policy_label.go feat: remove org (#4148) 2022-11-30 17:01:17 +01:00
policy_lockout_converter.go feat: provide option to limit (T)OTP checks (#7693) 2024-04-10 09:14:55 +00:00
policy_lockout.go feat: provide option to limit (T)OTP checks (#7693) 2024-04-10 09:14:55 +00:00
policy_login_converter.go feat: allow to force MFA local only (#6234) 2023-07-20 04:06:16 +00:00
policy_login.go fix: keep user idp links (#7079) 2023-12-19 10:25:50 +00:00
policy_notification.go feat: add notification policy and password change message (#5065) 2023-01-25 09:49:41 +01:00
policy_password_age_converter.go chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
policy_password_age.go feat: remove org (#4148) 2022-11-30 17:01:17 +01:00
policy_password_complexity_converter.go chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
policy_password_complexity.go feat: remove org (#4148) 2022-11-30 17:01:17 +01:00
policy_privacy_converter.go feat(cnsl): docs link can be customized and custom button is available (#7840) 2024-05-13 16:01:50 +02:00
policy_privacy.go feat: remove org (#4148) 2022-11-30 17:01:17 +01:00
project_application_converter.go feat(OIDC): add back channel logout (#8837) 2024-10-31 15:57:17 +01:00
project_application.go feat(crypto): use passwap for machine and app secrets (#7657) 2024-04-05 09:35:49 +00:00
project_converter.go chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
project_grant_converter.go refactor: rename package errors to zerrors (#7039) 2023-12-08 15:30:55 +01:00
project_grant.go perf: user grant owner removed (#6962) 2024-01-08 15:26:30 +00:00
project.go perf: user grant owner removed (#6962) 2024-01-08 15:26:30 +00:00
replacer.md feat: protos refactoring 2021-03-09 10:30:11 +01:00
server.go feat: trusted (instance) domains (#8369) 2024-07-31 18:00:38 +03:00
user_converter.go feat: allow machine user id to be set during creation (#8265) 2024-07-16 09:27:37 +02:00
user_grant_converter.go chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
user_grant.go perf: user grant owner removed (#6962) 2024-01-08 15:26:30 +00:00
user.go fix: generalise permission check for query user information (#8458) 2024-08-23 06:44:18 +00:00