This repository was archived by the owner on Feb 5, 2025. It is now read-only.
This repository was archived by the owner on Feb 5, 2025. It is now read-only.
Signing key rotation does not consider actual key lifetime #1234
Closed
Description
Which version of Duende IdentityServer are you using?
6.2.3
Which version of .NET are you using?
7.0
Describe the bug
When increasing the RotationInterval for signing keys as described here new signing keys are not created anymore until the new RotationInterval passed. This leads to invalid keys at the endpoint for some time (~ NewRotationInternal - OldRotationInterval)
To Reproduce
- Set the RotationInterval to 1 hour.
- Set the RotationInterval to 12 hours.
Expected behavior
After the old key expired (latest one hour after deployment of new RotationInterval), new ones should be created.
Log output/exception with stacktrace
There is no exception within the application, but it can be discovered that they keys at the endpoint will be invalid after the OldRotationInterval passed.