-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Claims don't bypass the cache for OBO and client_credentials #6173
Comments
Assigning to you @hectormmg as discussed over Teams. Thanks for observing this behavior ! |
I am not sure this is correct, I think @Robbie-Microsoft you tried it out and the cache is bypassed? |
I think I tried it out, but I can't remember. I noticed this is from last June and is for msal-node v1. Should I test this in v2? Or only v1? |
Only the current version of MSAL (2.x) |
I just tried it out for client credentials with
for the third request, and the token is indeed returned from the cache. Claims DO NOT bypass the cache for client credentials. |
I'm surprised. You closed this #6769 which is a superset. Step 4 there states "token does not come from the cache". What changed? In any case, this is a P1 that needs to be fixed then. |
I'm not sure what happened, but it looks like that PR is missing steps 4 & 5 for client_credentails, obo, and auth_code. Investigating now. |
@bgavrilMS I see my error now. I misinterpreted your description of the unit tests that needed to be written. I have now modified the unit test to properly test that requests with claims skip the cache. |
Core Library
MSAL Node (@azure/msal-node)
Core Library Version
1.17.3
Wrapper Library
Not Applicable
Wrapper Library Version
n/a
Public or Confidential Client?
Confidential
Description
claims="foo"
Expected: request should go to the STS
Actual: token is served from the cache
Impact: this breaks the CAE scenario for web api and the upcoming CAE support for S2S
Error Message
see description
Msal Logs
see description
MSAL Configuration
Relevant Code Snippets
Reproduction Steps
see description
Expected Behavior
see description
Identity Provider
Azure AD / MSA
Browsers Affected (Select all that apply)
None (Server)
Regression
No response
Source
Internal (Microsoft)
The text was updated successfully, but these errors were encountered: