diff --git a/.changelog/2455.txt b/.changelog/2455.txt new file mode 100644 index 00000000000..a3908aeb007 --- /dev/null +++ b/.changelog/2455.txt @@ -0,0 +1,3 @@ +```release-note:enhancement +access_application: Add support for SaaS OIDC Access Token Lifetime +``` diff --git a/access_application.go b/access_application.go index 315ccb0270a..bdeaf79cd8d 100644 --- a/access_application.go +++ b/access_application.go @@ -246,6 +246,7 @@ type SaasApplication struct { AllowPKCEWithoutClientSecret *bool `json:"allow_pkce_without_client_secret,omitempty"` RefreshTokenOptions *RefreshTokenOptions `json:"refresh_token_options,omitempty"` HybridAndImplicitOptions *AccessApplicationHybridAndImplicitOptions `json:"hybrid_and_implicit_options,omitempty"` + AccessTokenLifetime string `json:"access_token_lifetime,omitempty"` } type AccessAppLauncherCustomization struct { diff --git a/access_application_test.go b/access_application_test.go index 714dde5686b..1783863950b 100644 --- a/access_application_test.go +++ b/access_application_test.go @@ -1130,7 +1130,8 @@ func TestCreateOIDCSaasAccessApplications(t *testing.T) { "hybrid_and_implicit_options": { "return_id_token_from_authorization_endpoint": true, "return_access_token_from_authorization_endpoint": true - } + }, + "access_token_lifetime": "1m" } } } @@ -1177,6 +1178,7 @@ func TestCreateOIDCSaasAccessApplications(t *testing.T) { ReturnIDTokenFromAuthorizationEndpoint: BoolPtr(true), ReturnAccessTokenFromAuthorizationEndpoint: BoolPtr(true), }, + AccessTokenLifetime: "1m", }, CreatedAt: &createdAt, UpdatedAt: &updatedAt, @@ -1207,6 +1209,7 @@ func TestCreateOIDCSaasAccessApplications(t *testing.T) { ReturnIDTokenFromAuthorizationEndpoint: BoolPtr(true), ReturnAccessTokenFromAuthorizationEndpoint: BoolPtr(true), }, + AccessTokenLifetime: "1m", }, SessionDuration: "24h", }) @@ -1238,6 +1241,7 @@ func TestCreateOIDCSaasAccessApplications(t *testing.T) { ReturnIDTokenFromAuthorizationEndpoint: BoolPtr(true), ReturnAccessTokenFromAuthorizationEndpoint: BoolPtr(true), }, + AccessTokenLifetime: "1m", }, SessionDuration: "24h", })