Frequent reauth doesn't make you more secure
Authentication mechanics & terminology
- Long subthread on “session cookies”: some use the browser definition (cleared on close, no expiry), others mean “cookie holding a session ID” with arbitrary lifetime. Several note this ambiguity causes confusion.
- Discussion of access vs refresh tokens: many favor short‑lived access tokens with longer‑lived refresh tokens to enable revocation without constant user logins.
- Debate over stateless JWT/OIDC vs server‑side session stores: JWTs avoid DB lookups but complicate revocation; others prefer fast in‑memory or Redis checks plus server‑side invalidation.
UX friction, productivity loss, and user workarounds
- Many report being forced to reauth multiple times per day across SSO, VPN, email, dev tools, and web apps, often right before meetings or in the middle of work.
- Examples: corporate Office 365/Teams, Google Workspace 14‑day defaults, Jira with 30‑minute timeouts, Zoom, Heroku’s 25‑hour sessions, EV charging apps that log users out and block charging.
- People respond with insecure workarounds: passwords on post‑its or barcodes, keyboard macros, shared credentials, bypassing MFA, or abandoning apps entirely.
Security value vs security theater
- Widespread agreement that frequent reauth and forced password rotation mostly create fatigue and worse passwords (incrementing suffixes, trivial patterns) without materially improving security.
- Frequent prompts condition users to reflexively approve MFA or enter passwords, making phishing and MFA‑fatigue attacks easier.
- Several note availability is part of security; controls that regularly block legitimate access degrade overall security posture.
Compliance, auditors, and institutional inertia
- Commenters blame outdated standards and auditors (PCI, NIS2, some SOC2 interpretations) for enforcing rotation and short sessions even as NIST and major vendors now advise against it.
- Organizations often keep bad policies to satisfy checklists, insurers, or to preserve plausible deniability after breaches.
Edge cases and arguments for shorter sessions
- Some defend shorter sessions for shared or public computers, BYOD with family members nearby, and limiting the window for stolen session tokens.
- Others counter that screen‑locking and proper device practices are more appropriate than punishing all users with global short timeouts.
Alternatives and better patterns
- Proposed approaches: central SSO with long but revocable sessions; short‑lived access tokens plus revocable refresh tokens; risk‑based or contextual MFA; passkeys; device‑level biometrics; and OS‑level screen‑lock policies.
- Some warn against over‑trusting device biometrics and platform ecosystems, citing hardware flaws and lock‑in.
Vendor and product complaints (and irony)
- Heavy criticism of Apple, Google, Microsoft, Okta, and others for inconsistent, intrusive reauth flows (App Store, iCloud, Google Docs, MS Auth dialogs, etc.).
- Several point out Tailscale itself expires device keys and requires SSO from big IdPs, calling the blog post somewhat ironic despite agreeing with its core thesis.