FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    Log in to post
    Load new posts
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics
    • All categories
    • D

      Admin UI actions over themes blocks application since 1.61.2

      General Discussion
      • • • david.cuen
      14
      0
      Votes
      14
      Posts
      715
      Views

      mark.robustelliM

      @david-cuen I wasn't able to find much else out on Friday. Awesome that it looks like you have it narrowed down to the size. I will try to replicate this. I will let you know if I can.

    • T

      Unsolved "A request to the search index has failed" - OpenSearch(AWS)

      Q&A
      • • • tim.clark
      2
      0
      Votes
      2
      Posts
      384
      Views

      mark.robustelliM

      @tim-clark Can you please point to the community discussion where this comes up? I could not find it in the issues.

    • H

      Unsolved FusionAuth Cloud requests timing out continuously (admin UI + auth flows)

      Q&A
      • • • hemanth18pages
      2
      0
      Votes
      2
      Posts
      371
      Views

      mark.robustelliM

      @hemanth18pages raising the support ticket is the way to go for sure. It will be good to know if anyone else is experiencing this too.

    • V

      Unsolved can't use fusion auth react sdk when fusion auth server runs locally on fusionauth.localhost:

      Q&A
      • • • valerii15298
      5
      0
      Votes
      5
      Posts
      3.2k
      Views

      mark.robustelliM

      @bernardo-munz Did you play with the SameSite setting?

    • T

      Error getting list application due to sql error (mysql)

      Comments & Feedback
      • • • traperwaze
      5
      0
      Votes
      5
      Posts
      26.0k
      Views

      R

      @dan said in Error getting list application due to sql error (mysql):

      @traperwaze said in Error getting list application due to sql error (mysql):

      MariaDB server

      I believe the issues is that we don't support MariaDB.

      This is a known issue: https://github.com/FusionAuth/fusionauth-issues/issues/367 poki

      Do you see the same issue with a supported version of MySQL or PostgreSQL?

      Thanks for confirming. That lines up with what I’m seeing as well. We are indeed running MariaDB, and it looks like the JSON operator (->>) used in that query isn’t supported the same way in MariaDB, which would explain the syntax error.

      We haven’t tested this yet on a supported database, but based on the linked issue and your comment, it does appear to be a MariaDB compatibility problem rather than a misconfiguration on our side. We’ll plan to test against a supported version of MySQL and/or PostgreSQL to confirm.

      Appreciate you pointing us to the GitHub issue — that helps clarify things a lot.

    • D

      Prometheus is dropping samples with duplicate timestamps

      General Discussion
      • • • dalamenona
      3
      0
      Votes
      3
      Posts
      1.6k
      Views

      D

      @dalamenona We had the same error with Prometheus.
      The following opened FusionAuth issue contains information about the topic

      https://github.com/FusionAuth/fusionauth-issues/issues/3082

      Best regards.

    • S

      Unsolved oauthConfiguration.clientSecret is missing on /api/application/search response since 1.62.0

      Q&A
      • • • simon.chrzanowski
      2
      0
      Votes
      2
      Posts
      628
      Views

      mark.robustelliM

      @simon-chrzanowski can you please share the code you using? (please be sure to hide anything sensitive like your API Key)

    • danD

      Solved Claims to check when using google as an idp for google workspace

      Q&A
      • google idp workspace • • dan
      3
      0
      Votes
      3
      Posts
      1.4k
      Views

      M

      @dan said in Claims to check when using google as an idp for google workspace:

      You should start by checking the relevant google documentation.

      As of writing, this is what their doc says:

      Using the email, email_verified and hd fields, you can determine if Google hosts and is authoritative for an email address. In the cases where Google is authoritative, the user is known to be the legitimate account owner, and you may skip password or other challenge methods.

      Cases where Google is authoritative:

      email has a @gmail.com suffix, this is a Gmail account. email_verified is true and hd is set, this is a Google Workspace account.

      Users may register for Google Accounts without using Gmail or Google Workspace. When email does not contain a @gmail.com suffix and hd is absent, Google is not authoritative and password or other challenge methods are recommended to verify the user. email_verified can also be true as Google initially verified the user when the Google account was created, however ownership of the third party email account may have since changed.

      So in this case, you want to check that hd is set as well as that email_verified is true.

      With FusionAuth, you can check this using a reconcile lambda and looking at the id_token:

      https://fusionauth.io/docs/extend/code/lambdas/google-reconcile https://fusionauth.io/docs/extend/code/lambdas/openid-connect-response-reconcile

      Thank you from bringing this to light.

    • A

      Unsolved Pass value from API to webhook

      Q&A
      • • • alexandros.nafas
      3
      0
      Votes
      3
      Posts
      724
      Views

      mark.robustelliM

      @alexandros-nafas , were you able to figure it out?

    • J

      Solved retrieve_user_using_jwt is not working with FA 1.62.1

      Q&A
      • • • johnmiller
      3
      0
      Votes
      3
      Posts
      897
      Views

      mark.robustelliM

      @johnmiller It looks like the issue is that the 'retrieve a user via JWT' functionality was removed in 1.60.0. (It appears the User API JWT authentication method was deprecated in version 1.50.0. An issue has been filed to remove it from the client libraries.

      Thank you from bringing this to light.

    • R

      Solved How can I configure session timeout on the admin panel?

      Q&A
      • • • rachel.flatt
      7
      0
      Votes
      7
      Posts
      1.3k
      Views

      R

      @mark-robustelli Thanks, I think that's resolved it!

    • R

      Unsolved Style problems in admin panel on user page after update to 1.62.0

      Q&A
      • • • Ruka
      2
      0
      Votes
      2
      Posts
      862
      Views

      mark.robustelliM

      @Ruka , this seems like something that should be reported as an issue.

    • P

      Unsolved Error Users

      Q&A
      • • • patrick_ag
      2
      0
      Votes
      2
      Posts
      819
      Views

      mark.robustelliM

      @patrick_ag Is this just when you are loading the page or are you trying to take some action?

    • W

      Solved Troubleshooting Blank FusionAuth Login Pages in Android WebViews on Specific Devices

      Frequently Asked Questions (FAQ)
      • • • wesley
      2
      0
      Votes
      2
      Posts
      874
      Views

      W

      This is indeed unusual, especially since the issue appears to affect only a single user and device, which makes a FusionAuth configuration issue unlikely.

      A few things to check and try:

      Open in External Browser Ask the user to tap the three-dot menu (if available) in the webview and choose “Open in Chrome” or their default browser. If the page loads correctly there, the issue is likely related to the embedded webview rather than FusionAuth itself.

      WebView / Browser-Specific Issues

      Some Android devices (including certain Xiaomi models) ship with custom WebView implementations or aggressive privacy/security settings that can interfere with embedded web content.

      Ensure the device has the latest Android System WebView and browser updates installed.

      Domain / CNAME Edge Cases

      There have been rare cases where mobile browsers or webviews behave unexpectedly if the domain includes characters such as underscores (_) or dashes (-) in certain positions.

      While this typically results in explicit errors (like “Address not found”), it’s still worth reviewing your domain and CNAME setup—especially since you’re self-hosting.

      Given that the login works for the same user on other devices, this is most likely a device- or WebView-specific issue rather than a problem with FusionAuth itself. If opening the login page in a full browser works, that should help narrow the root cause to the embedded webview implementation on that device.

    • W

      Solved Calling AWS API Gateway with SigV4 from FusionAuth Lambdas: Limitations and Recommended Architecture

      Frequently Asked Questions (FAQ)
      • api webhook webhooks • • wesley
      2
      0
      Votes
      2
      Posts
      954
      Views

      W

      You’re correct: FusionAuth’s Lambda environment does not provide access to external libraries (including AWS SDKs or SigV4 helpers), and there is no secure secrets store available to Lambdas. That means if you need AWS SigV4 signing from inside a Lambda, you would have to implement the signing logic yourself and embed any required credentials directly in the Lambda code—this is generally not considered secure.

      Also, if you are using FusionAuth Cloud, you cannot place Lambdas into your private network (for example, the same VPC/network as your API Gateway), so that option isn’t available in hosted deployments.

      If you need this capability, the recommended approach is typically to move the signing and secret handling into a system you control (for example, a backend service that FusionAuth calls), rather than performing SigV4 signing directly in a FusionAuth Lambda.

      Related issue tracking:
      https://github.com/fusionauth/fusionauth-issues/issues/1629

    • W

      Solved Why Webhook Transaction Settings Are Greyed Out in FusionAuth Cloud for User and Registration Events

      Frequently Asked Questions (FAQ)
      • webhooks webhook • • wesley
      2
      0
      Votes
      2
      Posts
      769
      Views

      W

      This is a known bug, and it looks like the underlying issue has already been identified and fixed. The fix will be included in the next FusionAuth release.

    • W

      Solved How to Enforce Customer-Specific Session Lifetimes and Fast Deprovisioning for Federated Users in FusionAuth

      Frequently Asked Questions (FAQ)
      • idp • • wesley
      2
      0
      Votes
      2
      Posts
      988
      Views

      W

      There are a couple of overlapping layers here.

      Access tokens aren’t revocable by default
      Access tokens (JWTs) are self-contained. Once issued, they remain valid until they expire unless you implement a custom revocation strategy (such as token blacklisting). FusionAuth covers one approach here:
      https://fusionauth.io/articles/tokens/revoking-jwts
      So if your access token lifetime is 600 seconds, a disabled user could continue to access APIs until that token expires (up to ~10 minutes) unless you add an additional revocation layer.

      FusionAuth sessions are typically independent from the IdP
      Once the upstream IdP authenticates the user, FusionAuth generally maintains its own session state. If a user is disabled in the upstream IdP, that does not automatically invalidate FusionAuth sessions or prevent refresh token usage.
      So yes, depending on your implementation, a user can potentially continue to operate in FusionAuth even if they are disabled upstream, until you either:

      expire/stop honoring their tokens, or remove/disable the user in FusionAuth, or enforce additional checks at login/session refresh time.

      Options to meet “disabled within 300 seconds” for one customer
      If you need disablement to take effect quickly without shortening sessions for everyone, you generally need an integration that pushes the disablement signal into FusionAuth (or into your resource servers).

      A. SCIM (best fit when the customer maps cleanly to a tenant)
      If your customer can be logically isolated (e.g., “customer A users live in tenant A”), SCIM is a strong option. The customer’s IdP can provision/deprovision users into FusionAuth, and a disable/delete action can remove their FusionAuth access (including sessions). This is the cleanest approach when tenant segmentation is possible.

      B. Event-driven deprovisioning (IdP → your service → FusionAuth API)
      If the customer’s IdP can emit events (user disabled/deprovisioned), you can build a lightweight integration that:

      receives the IdP event, then disables or deletes the corresponding user in FusionAuth via API.

      Once the user is disabled/deleted in FusionAuth, they won’t be able to continue normal authentication flows.

      C. Token revocation strategy (resource server enforcement)
      If the requirement is “deny access within 300 seconds,” the most deterministic way is to enforce it at the API/resource-server layer by:

      using short access-token lifetimes (<= 300 seconds), and/or adding token blacklisting / introspection-style checks in your APIs.

      This avoids relying on refresh token expiration to enforce disablement.

      About limiting refresh token lifetime per customer

      A reconcile lambda can help with user provisioning and claims, but it won’t reliably solve the core issue of existing sessions and refresh tokens already issued. There isn’t a simple “per-customer refresh token TTL override” you can apply after the fact without an architectural approach like the ones above.

    • W

      Solved Why FusionAuth SAML Metadata Always Sets WantAssertionsSigned to False

      Frequently Asked Questions (FAQ)
      • saml • • wesley
      2
      0
      Votes
      2
      Posts
      1.0k
      Views

      W

      At this time, FusionAuth does not support changing WantAssertionsSigned to true in the generated SAML metadata. This value is hard-coded and cannot be modified through IdP configuration or other settings.

      From a practical standpoint, this should not impact security or standards compliance. FusionAuth signs the entire SAML response using the verification key configured in the IdP. Since the assertion is part of the signed response, signing the assertion itself would be redundant and is not required by the SAML specification.

      If your client strictly requires WantAssertionsSigned="true" due to a non-standard or legacy implementation, this would need to be addressed on the Service Provider side, as FusionAuth cannot currently emit metadata with that value set to true.

    • danD

      Editing user data in the UI

      Q&A
      • user data user interface • • dan
      18
      0
      Votes
      18
      Posts
      12.4k
      Views

      danD

      @brad sounds super frustrating.

      I'll send you a message.

    • W

      Solved Why You Can’t Create New Hosted Instances in the FusionAuth Account Portal on Invoiced Billing

      Frequently Asked Questions (FAQ)
      • cloud • • wesley
      2
      0
      Votes
      2
      Posts
      836
      Views

      W

      You’re correct—there is no fixed limit on the number of hosted FusionAuth instances you can have.
      However, since your account is on invoiced billing, new hosted deployments cannot be created directly through the Account Portal. That functionality is only available for self-serve billing accounts.

      Next Steps

      Our Customer Success team will reach out to you via email. They’ll help provision the additional non-production instances and add them to your existing order.

      Once that’s complete, you’ll have access to the new hosted deployments without needing to manage them through the portal yourself.