Skip to content
Snippets Groups Projects
Verified Commit a37dbb97 authored by Timm Fitschen's avatar Timm Fitschen
Browse files

DOC: update Authentication.rst

parent ff2d9ff8
No related branches found
No related tags found
1 merge request!96DOC: Added CITATION.cff to the list of files in the release guide where the...
Checking pipeline status
......@@ -23,12 +23,18 @@ password:
Logout
------
The server does not invalidate AuthTokens. They invalidate after they expire or
when the server is being restartet. Client should just delete their AuthToken
to 'logout'.
However, in order to remove the AuthToken cookie from the browsers there is a
convenient resource which will invalidate the cookie (not the AuthToken).
Send
``GET http://host:port/logout``
with a valid AuthToken cookie. No new AuthToken will be returned and no AuthToken with that session
will be accepted anymore.
and the server will return an empty AuthToken cookie which immediately expires.
Example using ``curl``
----------------------
......@@ -65,19 +71,3 @@ To use the cookie, pass it on with later requests:
.. code-block:: sh
curl -X GET -b cookie.txt --insecure "https://<SERVER>/Entity/123"
.. _curl-logout:
Logout
~~~~~~
The server does not invalidate AuthTokens. They invalidate after they expire of
when the server is being restartet. Client should just delete their AuthToken
to 'logout'.
However, in order to remove the AuthToken cookie from the browsers there is a
convenient resource which will invalidate the cookie (not the AuthToken).
.. code-block:: sh
curl -X GET -b cookie.txt --insecure "https://<SERVER>/logout" # Now the cookie is invalidated.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment