Skip to content
This repository was archived by the owner on Feb 5, 2025. It is now read-only.
This repository was archived by the owner on Feb 5, 2025. It is now read-only.

Signing key rotation does not consider actual key lifetime #1234

Closed
@bertsch-ronja-office

Description

@bertsch-ronja-office

Which version of Duende IdentityServer are you using?
6.2.3

Which version of .NET are you using?
7.0

Describe the bug

When increasing the RotationInterval for signing keys as described here new signing keys are not created anymore until the new RotationInterval passed. This leads to invalid keys at the endpoint for some time (~ NewRotationInternal - OldRotationInterval)

To Reproduce

  1. Set the RotationInterval to 1 hour.
  2. Set the RotationInterval to 12 hours.

Expected behavior

After the old key expired (latest one hour after deployment of new RotationInterval), new ones should be created.

Log output/exception with stacktrace

There is no exception within the application, but it can be discovered that they keys at the endpoint will be invalid after the OldRotationInterval passed.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions