-
Notifications
You must be signed in to change notification settings - Fork 199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove Cached Google Login Credentials #3593
Comments
I dug a bit further and I can provide some more context to help you answer my question. TLDR: Logout deletes the keychain keys via When I call
However, the next time when I call
Is this a logic bug or user error? |
@popwarfour Thanks for your details query and analysis.
|
Thank you @harsh62 for getting back so quickly. Unfortunately, What other options do we have? We can't be the only ones requesting this behavior so I'm sure its been solved. Could our backend expose an endpoint that manually logs out of the IdP in parallel with the regular |
The cached I would suggest to be mindful and make sure that this is clearly what you want. Because if you look at the other way around, I can log out of all of my Google accounts and still be logged into your app. Once your app knows who the user is, that person can log out of Google. Google is no longer needed. However, it's crucial to consider the ramifications of logging a user out of a IdP. Imagine the inconvenience for users who utilize their Google account across multiple apps. Should they be forced to reauthenticate with Google each time they log out of one of your apps? Such an approach risks user frustration and fatigue. Finally if you still decide you want to do it, as a workaround try setting up the IdP as SAML or OIDC provider in the cognito console and enable IdP sign out flow. I would suggest to read up Cognito Documentation to get better understanding on how it works. There could possibly be other workarounds that you can explore, i.e. building your own custom logout workflow, which upon successful log out could redirect to the IdP log out flow. |
This issue is now closed. Comments on closed issues are hard for our team to see. |
Describe the bug
I'm not so sure this is a bug or user error but its certainly odd behavior IMO (see reproduction steps).
How can I logout the user such that when they attempt to re-signin via the same federated source it does not automatically select their previous account?
Steps To Reproduce
Expected behavior
When the google auth webview pops up you should be given a chance to select any of your google accounts.
Amplify Framework Version
2.28.0
Amplify Categories
Auth
Dependency manager
Swift PM
Swift version
5.9
CLI version
12.10.3
Xcode version
15.2
Relevant log output
Is this a regression?
Yes
Regression additional context
No response
Platforms
iOS
OS Version
17.2
Device
iPhone 15
Specific to simulators
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: