diff --git a/proposals/4108-oidc-qr-login.md b/proposals/4108-oidc-qr-login.md index 4012a5984..ff71531f7 100644 --- a/proposals/4108-oidc-qr-login.md +++ b/proposals/4108-oidc-qr-login.md @@ -57,9 +57,8 @@ n.b. Once a new payload has been sent there is no mechanism to retrieve previous #### Expiry The rendezvous session (i.e. the payload) SHOULD expire after a period of time communicated to clients via the `Expires` -header. After this point, any further attempts to query or update the payload MUST fail. The expiry time SHOULD be -extended every time the payload is updated. The rendezvous session can be manually expired with a `DELETE` call to the -rendezvous session. +header. After this point, any further attempts to query or update the payload MUST fail. The rendezvous session can be +manually expired with a `DELETE` call to the rendezvous session. ####  API @@ -220,7 +219,10 @@ The server should allow a minimum payload size of 10KB and enforce a maximum pay ###### Maximum duration of a rendezvous -The rendezvous session only needs to persist for the duration of the handshake. So a timeout such as 30 seconds is adequate. +The rendezvous session needs to persist for the duration of the login. So a timeout such as 60 seconds should be adequate. + +It does need to allow the user another time to confirm that the secure channel has been established and complete any extra +OIDC Provider mandated login steps such as MFA. Clients should handle the case of the rendezvous session being cancelled or timed out by the server.