Skip to content

Add support to invalidate the cache of a Shiro Principal #269

Open
@Sherpard

Description

@Sherpard

Right now, by default, shiro remembrs the credentials submited by the user, to prevent redundant lookups checking the realm / permission mappers and so on.

That's done following the premise that the user credentials can be cached.

If the account is managed by the application itself (Custom realm) and allows the user to change the password, until the cache expires by itself, the user won't be able to use the new credentials.

There's a way to avoid this issue, disabling security cache all together (security -> cache -> false).
But that makes that every request has to be re-authenticated and re-authorized. That's not ideal.

ShiroRealmAdapter parent, has Autorizingrealm.clearCachedAuthorization(PrincipalCollection principals) that would prove beneficial, so the user can manage the cache.

I'll try to work in a controlled way to manage the cache with the mechanism that are in place.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions