When a user logs in to Workbench, they receive a newly created token that grants access to the Arvados API on behalf of that user. By default, this token does not expire until the user explicitly logs off.
Security policies, such as for GxP Compliance, may require that tokens expire by default in order to limit the risk associated with a token being leaked.
Login.TokenLifetime configuration enables the administrator to set a expiration lifetime for tokens granted through the login flow.
Suppose that the organization’s security policy requires that user sessions should not be valid for more than 12 hours, the cluster configuration should be set like the following:
Clusters: zzzzz: ... Login: TokenLifetime: 12h ...
With this configuration, users will have to re-login every 12 hours.
When this configuration is active, the workbench client will also be “untrusted” by default. This means tokens issued to workbench cannot be used to list other tokens issued to the user, and cannot be used to grant new tokens. This stops an attacker from leveraging a leaked token to aquire other tokens.
TokenLifetime is zero, which disables this feature.
If you have an existing Arvados installation and want to set a token lifetime policy, there may be user tokens already granted. The administrator can use the following
rake tasks to enforce the new policy.
db:check_long_lived_tokens task will list which users have tokens with no expiration date.
# bundle exec rake db:check_long_lived_tokens Found 6 long-lived tokens from users: user2,firstname.lastname@example.org,zzzzz-tpzed-5vzt5wc62k46p6r admin,email@example.com,zzzzz-tpzed-6drplgwq9nm5cox user1,firstname.lastname@example.org,zzzzz-tpzed-ftz2tfurbpf7xox
To apply the new policy to existing tokens, use the
# bundle exec rake db:fix_long_lived_tokens Setting token expiration to: 2020-08-25 03:30:50 +0000 6 tokens updated.
NOTE: These rake tasks adjust the expiration of all tokens except those belonging to the system root user (
zzzzz-tpzed-000000000000000). If you have tokens used by automated service accounts that need to be long-lived, you can create tokens that don’t expire using the command line .
The content of this documentation is licensed under the
Commons Attribution-Share Alike 3.0 United States licence.
Code samples in this documentation are licensed under the Apache License, Version 2.0.