mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-06 19:08:59 -05:00
[PR #16333] [CLOSED] FEAT: simplify OAuth signout to avoid forcing external provider logout #39729
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/open-webui/open-webui/pull/16333
Author: @Kharote
Created: 8/6/2025
Status: ❌ Closed
Base:
dev← Head:main📝 Commits (1)
9827c9bsimplify OAuth signout to avoid forcing external provider logout📊 Changes
1 file changed (+1 additions, -33 deletions)
View changed files
📝
backend/open_webui/routers/auths.py(+1 -33)📄 Description
Improve user experience by removing forced external OAuth provider logout during signout
Remove OpenID provider logout redirect that forced users out of their external accounts
Keep local session cleanup (delete token, oui-session, and oauth_id_token cookies)
Preserve existing WEBUI_AUTH_SIGNOUT_REDIRECT_URL redirect functionality
Eliminate unnecessary HTTP requests to external OAuth providers during signout
Allow users to quickly re-authenticate without re-entering provider credentials
This change provides a more user-friendly signout experience by only logging users out of the application while maintaining their external OAuth sessions for seamless re-authentication.
Pull Request Checklist
Note to first-time contributors: Please open a discussion post in Discussions and describe your changes before submitting a pull request.
Before submitting, make sure you've checked the following:
devbranch.Changelog Entry
Description
Simplified OAuth signout process to improve user experience by removing forced external provider logout while maintaining local session cleanup and redirect functionality
Added
N/A
Changed
Modified signout endpoint to only clear local application cookies (token, oui-session, oauth_id_token) without redirecting to external OAuth provider logout endpoints
Streamlined signout flow to reduce unnecessary HTTP requests to external providers
Maintained existing WEBUI_AUTH_SIGNOUT_REDIRECT_URL redirect functionality for custom post-signout redirects
Deprecated
N/A
Removed
Removed OpenID Connect end_session_endpoint redirect logic that forced users to log out of their external OAuth accounts
Removed complex error handling for external OAuth provider communication during signout
Removed aiohttp ClientSession usage and OpenID provider configuration fetching during signout
Fixed
Fixed user experience issue where signing out of the application would also force logout from external OAuth accounts
Fixed unnecessary network requests to external OAuth providers during application signout
Security
Maintained proper local session cleanup by ensuring all authentication cookies are properly deleted
Preserved security by clearing oauth_id_token to prevent token reuse
Breaking Changes
N/A
Additional Information
This change affects all OAuth/OpenID Connect providers configured in the system
Users will now have a smoother experience when signing out and back in, as they won't need to re-authenticate with their external provider unless their external session has expired
The change reduces network latency during signout by eliminating external API calls
Local application security is maintained through proper cookie cleanup
Screenshots or Videos
N/A (Backend authentication flow change)
Contributor License Agreement
By submitting this pull request, I confirm that I have read and fully agree to the Contributor License Agreement (CLA), and I am providing my contributions under its terms.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.