mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-03-01 11:19:52 +03:00
Refreshing browser on webvault locks vault #738
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @renannprado on GitHub (Jul 4, 2020).
Subject of the issue
bitwarden_rs is requesting for the vault to be unlocked after refresh even though it's set to lock after 15min.
Your environment
Steps to reproduce
Login into the web vault, check that your Vault Timeout is set to 15min, then refresh the browser. After the refresh, you'll be asked for the vault to be unlocked again even though 15min hasn't passed.
Expected behaviour
As long as the Vault Timeout hasn't been reached, the web vault should be kept unlocked, regardless of page refresh.
Actual behaviour
After refreshing the browser, the webvault locks, ignoring the
Vault Timeoutyou have set.Relevant logs
N/A
@dani-garcia commented on GitHub (Jul 5, 2020):
This is how it works in the official vault, I assume to avoid having to store the master password as cookies or in the browsers local storage. We try to keep the web vault's code as close as possible to the upstream version, with only minimal patches, so if you want this feature to be different, you might try checking the official comunity for an open thread or you can create one yourself: https://community.bitwarden.com/.
That said, checking at the available options which are something like:
It does seem to imply that all but the last option only lock when the time limit is reached, i guess the last option should probably be named "Only when refreshing the page" instead.
@wirwolf commented on GitHub (Dec 13, 2023):
@dani-garcia you can store the access token with the refresh token and expired time. And when the user refresh the page frontend request to the server and validate session(IP, user agent, fingerprint,other params).
You can also add an option in the user profile for not saving token locally.
This case is very decreasing usability.