You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We should introduce a cache over fetched JWKS/OpenID configuration documents from delegated identity providers. A short TTL should be sufficient (e.g minutes)
Why?
Reduce latency of JWT/OIDC based join methods. Today, for these to complete, Teleport must complete one or two roundtrips to the upstream identity provider.
Reduce load on the upstream and on Teleport itself in cases of a stampeding herd of joins.
Improve reliability by mitigating the impact of short outages of the upstream identity provider or network blips.
The cache TTL shouldn't be too long - we want to ensure we're notified of changes to the JWKS and react to these quickly - or JWTs issued by a new keypair may be considered invalid by Teleport.
The text was updated successfully, but these errors were encountered:
We should introduce a cache over fetched JWKS/OpenID configuration documents from delegated identity providers. A short TTL should be sufficient (e.g minutes)
Why?
The cache TTL shouldn't be too long - we want to ensure we're notified of changes to the JWKS and react to these quickly - or JWTs issued by a new keypair may be considered invalid by Teleport.
The text was updated successfully, but these errors were encountered: