[GH-ISSUE #4624] OAuth Token Revocation #18629

Closed
opened 2026-04-15 17:11:28 -05:00 by GiteaMirror · 1 comment
Owner

Originally created by @zozobalogh0817 on GitHub (Sep 13, 2025).
Original GitHub issue: https://github.com/better-auth/better-auth/issues/4624

Is this suited for github?

  • Yes, this is suited for github

OAuth Token revocation
https://datatracker.ietf.org/doc/html/rfc7009
https://auth0.com/docs/secure/tokens/refresh-tokens/revoke-refresh-tokens

Describe the solution you'd like

I would like to have an option to revoke individual access or refresh tokens. Additionally, when revoking a user session, it should also revoke all tokens that were issued under that session, ensuring the user is fully logged out everywhere.

Describe alternatives you've considered

Key rotation (rotate signing keys to invalidate all tokens)
Effective but too coarse-grained; revokes tokens for everyone, causing mass logouts and operational overhead.

Additional context

No response

Originally created by @zozobalogh0817 on GitHub (Sep 13, 2025). Original GitHub issue: https://github.com/better-auth/better-auth/issues/4624 ### Is this suited for github? - [x] Yes, this is suited for github ### Is your feature request related to a problem? Please describe. OAuth Token revocation https://datatracker.ietf.org/doc/html/rfc7009 https://auth0.com/docs/secure/tokens/refresh-tokens/revoke-refresh-tokens ### Describe the solution you'd like I would like to have an option to revoke individual access or refresh tokens. Additionally, when revoking a user session, it should also revoke all tokens that were issued under that session, ensuring the user is fully logged out everywhere. ### Describe alternatives you've considered Key rotation (rotate signing keys to invalidate all tokens) Effective but too coarse-grained; revokes tokens for everyone, causing mass logouts and operational overhead. ### Additional context _No response_
GiteaMirror added the lockedenhancement labels 2026-04-15 17:11:29 -05:00
Author
Owner

@dosubot[bot] commented on GitHub (Dec 13, 2025):

Hi, @zozobalogh0817. I'm Dosu, and I'm helping the better-auth team manage their backlog and am marking this issue as stale.

Issue Summary:

  • You requested support for OAuth token revocation to allow individual access or refresh tokens to be revoked.
  • You also want session revocation that invalidates all tokens issued under that session for a full logout experience.
  • Current workarounds like key rotation are too broad and cause mass logouts, which is not ideal.
  • There has been no activity or comments on this issue so far.

Next Steps:

  • Please let me know if this feature request is still relevant to the latest version of better-auth by commenting on this issue.
  • If I do not hear back within 7 days, I will automatically close this issue.

Thank you for your understanding and contribution!

<!-- gh-comment-id:3649576672 --> @dosubot[bot] commented on GitHub (Dec 13, 2025): Hi, @zozobalogh0817. I'm [Dosu](https://dosu.dev), and I'm helping the better-auth team manage their backlog and am marking this issue as stale. **Issue Summary:** - You requested support for OAuth token revocation to allow individual access or refresh tokens to be revoked. - You also want session revocation that invalidates all tokens issued under that session for a full logout experience. - Current workarounds like key rotation are too broad and cause mass logouts, which is not ideal. - There has been no activity or comments on this issue so far. **Next Steps:** - Please let me know if this feature request is still relevant to the latest version of better-auth by commenting on this issue. - If I do not hear back within 7 days, I will automatically close this issue. Thank you for your understanding and contribution!
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/better-auth#18629