You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The defect may already be reported! Please search for the defect before creating one.
Current Behavior:
When either accessing a link to dependency-track ( usually links to vulnerability pages ) or directly ctrl+clicking to a link to open it on a new tab asks you to re-log in instead of loading the requested page (when you already just logged in before). Also, when you log in again you are not redirected to the previously requested page but to the home page instead.
This issue impacts usability of the platform as it makes difficult to navigate to child views or access a specific page from a link provided by an alert or any other source where that link might have been copy-pasted/sent to/from.
Steps to Reproduce:
ctrl+click a vulnerability link or open a previously generated link to a vulnerability description.
Expected Behavior:
Page is loaded without needing to re-authenticate.
In case the token is really expired it should re-direct to the previously requested page instead of the homepage.
Environment:
Dependency-Track Version: 3.8
Distribution: Docker
BOM Format & Version: Does not Apply
Database Server: Mysql
Browser: Chrom v83
The text was updated successfully, but these errors were encountered:
The defect may already be reported! Please search for the defect before creating one.
Current Behavior:
When either accessing a link to dependency-track ( usually links to vulnerability pages ) or directly ctrl+clicking to a link to open it on a new tab asks you to re-log in instead of loading the requested page (when you already just logged in before). Also, when you log in again you are not redirected to the previously requested page but to the home page instead.
This issue impacts usability of the platform as it makes difficult to navigate to child views or access a specific page from a link provided by an alert or any other source where that link might have been copy-pasted/sent to/from.
Steps to Reproduce:
ctrl+click a vulnerability link or open a previously generated link to a vulnerability description.
Expected Behavior:
Page is loaded without needing to re-authenticate.
In case the token is really expired it should re-direct to the previously requested page instead of the homepage.
Environment:
The text was updated successfully, but these errors were encountered: