Skip to content
Snippets Groups Projects
Verified Commit a37dbb97 authored by Timm Fitschen's avatar Timm Fitschen
Browse files

DOC: update Authentication.rst

parent ff2d9ff8
No related branches found
No related tags found
1 merge request!96DOC: Added CITATION.cff to the list of files in the release guide where the...
Pipeline #36269 passed
...@@ -23,12 +23,18 @@ password: ...@@ -23,12 +23,18 @@ password:
Logout Logout
------ ------
The server does not invalidate AuthTokens. They invalidate after they expire or
when the server is being restartet. Client should just delete their AuthToken
to 'logout'.
However, in order to remove the AuthToken cookie from the browsers there is a
convenient resource which will invalidate the cookie (not the AuthToken).
Send Send
``GET http://host:port/logout`` ``GET http://host:port/logout``
with a valid AuthToken cookie. No new AuthToken will be returned and no AuthToken with that session and the server will return an empty AuthToken cookie which immediately expires.
will be accepted anymore.
Example using ``curl`` Example using ``curl``
---------------------- ----------------------
...@@ -65,19 +71,3 @@ To use the cookie, pass it on with later requests: ...@@ -65,19 +71,3 @@ To use the cookie, pass it on with later requests:
.. code-block:: sh .. code-block:: sh
curl -X GET -b cookie.txt --insecure "https://<SERVER>/Entity/123" curl -X GET -b cookie.txt --insecure "https://<SERVER>/Entity/123"
.. _curl-logout:
Logout
~~~~~~
The server does not invalidate AuthTokens. They invalidate after they expire of
when the server is being restartet. Client should just delete their AuthToken
to 'logout'.
However, in order to remove the AuthToken cookie from the browsers there is a
convenient resource which will invalidate the cookie (not the AuthToken).
.. code-block:: sh
curl -X GET -b cookie.txt --insecure "https://<SERVER>/logout" # Now the cookie is invalidated.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment