Mimecast breaks silent authentication

We have a client using Mimecast for their corporate email security. It seems to be disrupting the login session or state as they are having to continually login after closing their browser.

The experience is similar to these, although we are not using passwordless, Mimecast triggering Passwordless OTP before getting to inbox and Passwordless login breaks for many users on corporate e-mail domains.

We’ll be reaching out to the client to see if a whitelist policy can alleviate the problem but are there any workarounds on the Auth0 side? Can anyone explain what is happening? We’re using PCKE flow and refresh token rotation with reuse interval of 0. Would increasing the reuse interval help?

Our current theory we have is both Mimecast and then the actual user is using the same refresh token and causing a breech detection.

Thanks.

Hey there @peter23 !

We could angle the problem from the perspective of access and refresh tokens storage options.

If the browser properties are leveraged to provide some storage persistence (so that refreshing or restoring a page with your app doesn’t result in a requirement to log in again), roughly two scenarios occur:

  1. local storage property is used which allows persistence over switching to different tabs with your app or reopening a browser.

If you have initiated your auth0 sdk with this option and still encounter the issue, it could potentially mean that some other process clears local storage once the browser is closed.

  1. page session storage / browser in-memory property is used which allows storing as long as a particular tab is open and (in case of some browsers) is immune to page reloads, but not persistent over switching to a different tab or reopening a browser.

If this logic is used in your app, the behaviour experienced by users seems to be expected.

I found this docs somehow relevant -

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.