@kevin-doran This is a great question to ask FusionAuth support.
Have you opened a ticket?
Users who have rights to post in the FAQ category.
@kevin-doran This is a great question to ask FusionAuth support.
Have you opened a ticket?
Thank you for letting us know.
This is an open issue. To see when this is resolved, you can follow along with the github issue here: https://github.com/FusionAuth/fusionauth-issues/issues/3439
The cleanest way to do it is with asymmetric JWT verification plus a bounded offline grace period.** Here's the pattern.
FusionAuth signs JWTs with a private key it holds. The matching public key is published at the JWKS endpoint (/.well-known/jwks.json). Your mobile app — or any resource server — can verify a token's signature locally, with zero network calls, as long as it has that public key. You can even bundle the public key with the application and avoid the retrieving it.
That's the property that makes offline auth possible. You're not asking "is this token still good?" over the wire; you're asking "did FusionAuth sign this, and has it expired?" using math the device can do on its own.
See JWT signing configuration and the JWKS endpoint docs.
The Flow
1. First login (online, required). The user authenticates against FusionAuth via OAuth with the offline_access scope, or via the Login API with loginId + password + applicationId. You get back two things:
Refresh token details are in the refresh token settings docs.
2. Cache the JWKS on the device. Fetch /.well-known/jwks.json once and store it. You'll match incoming tokens to the right key using the kid in the JWT header. For fully air-gapped scenarios, you can bundle the JWKS into the app at build time — see the air-gapping article.
3. Online operation. The app uses the access token for API calls. When it expires, the app calls the Refresh a JWT API with the refresh token to mint a new access token.
4. Offline operation. The app validates the cached access token locally:
kid matches the JWT headerexp, iss, aud, and any custom claims you care aboutIf the token is past exp but the device is offline, allow a bounded grace period (e.g., 24 hours past expiration). After that, degrade functionality until the device reconnects and refreshes. For instance, you could allow read operations but nothing that changes data.
5. On reconnect. Refresh immediately. If the refresh token has been revoked server-side, the call will fail and the user must re-authenticate.
Token lifetime tuning
This is where you make your security/availability tradeoff explicit. FusionAuth lets you tune both lifetimes per tenant or per application:
ttl_seconds
set this short for online use (5–15 minutes is typical), but if you want longer offline windows without the grace-period workaround, you can extend it. Whatever you pick is the maximum revocation lag for compromised tokens.What FusionAuth gives you for revocation
Refresh tokens can be revoked automatically on password change, MFA enrollment, or any action that prevents login. You can also call the Revoke Refresh Tokens API directly. The catch: revocation only takes effect the next time the device tries to refresh. Already-issued access tokens remain valid until their exp.
Tradeoffs you're signing up for
Be honest with yourself about this approach. These aren't FusionAuth limitations, they're inherent to offline auth:
exp checks rely on the device clock, which the user controls. If that matters for your threat model, store a "last known server time" on each refresh and refuse to validate tokens if the clock has moved backward.Practical starting point
Here's an example of the configuration:
expTighten the numbers for higher-sensitivity apps, loosen them for field-work apps where availability matters more than instant revocation.
Some further reading for you:
The short version: FusionAuth gives you all the primitives:
The offline policy is yours to design, and the design is mostly about choosing how much revocation lag you can tolerate in exchange for how much offline runway your users need.
I'm building a mobile app that needs to work in places with spotty or no connectivity (think field workers, transit, rural areas).
Can I use FusionAuth as my central identity provider while still letting users authenticate when the device is offline?
Yes, there's currently no support for using a certificate.
Here's an open tracking issue: https://github.com/FusionAuth/fusionauth-issues/issues/3083
Please comment and/or upvote this with any other details that would help the product team prioritize this.
@johnmiller I'm not 100% sure but that may be by design. You don't want to give away too much information. If it returned a specific error code, then you would know if the user exists or not.
Thanks for taking the time to chat with me.
I'm sharing the feedback internally, but for future folks there were multiple issues.
@elliotdickison please keep me honest and let me know if I missed something.
@elliotdickison I'd probably try with two Identity Providers configurations in FusionAuth both pointing to the same remote IDP.
One can have screen_hint=abc on the authorization URL and the other can have screen_hint=def, but both will have all the other parameters the same.
Then you can use an idp_hint on your create or login buttons.
I think that will work, but please let us know.
@elliotdickison Can you let us know what third party OIDC IdP you are working with?