During debugging of a nasty recurring GIT code 128 error in our CI/CD environment, we've found some design choices that have raised some questions about the inner workings of the credential cache in GIT. First, a little sketch of the situation. We are using GitHub Enterprise Cloud on Jenkins using the Github Branch Source Plugin. This plugin uses "GitHub Apps" (Service Accounts if you will), which use Application (Installation) Tokens to authenticate with GitHub. The tokens are used as regular passwords in this case. When a Jenkins job starts, it checks out the code from GitHub using the GIT command line, passing it a token with a lifetime between 45 and 60 minutes remaining (tokens have a max lifetime of 60m). This token is passed via the GIT_ASKPASS variable to give the commandline CI/CD job the ability to use the token for subsequent GIT actions locally during the job. We are seeing GIT code 128's in rare cases when jobs follow each other up at a fairly high tempo. The reason is: https://github.com/git/git/blob/master/http.c#L1637 . This line 'approves' a credential that gives a successful result. This means that Tokens that have been cached in the git-credential-cache-daemon will have it's timeout refreshed even though they might expire shortly. The credential cache timeout is a user-input timeout, and not a token timeout, and this structure collides with the functional lifetime of a token. There are several solutions to circumvent this issue: 1) We could ask the Plugin that manages the tokens to support managing the Credential Cache as well. This makes it possible for the plugin to actively manage tokens and revoke tokens from the cache that have expired. Downside is that making plugins aware of the cache in git, might not be a good idea, and there might even be cases where caching is disabled completely, which would still require the ASKPASS method. 2) We could add an option to the GIT client that has the same functionality as the ASKPASS variable, but one that takes precedence before the cache. This way, one can preseed the GIT client with credentials that will *always* be used, even if there is a cache that has a credential for the given URL. 3) We could alter the cache daemon (or build a new one) that has more elaborate options regarding it's timeout. Perhaps a daemon option like "--keep-timeout-on-approve". This would mean that if a credential is approved for a second time the timeout is not refreshed. Currently the daemon just removes any old credentials from it's cache and adds the new one without questioning the intention of the user. We could add a check that tests if the incoming credential is equal to the currently cached credential, and skip updating the expiration date if they are the same. (With an exception when receiving a new password, then we should forcefully update). This means that the --timeout option from the daemon will become a 'hard' timeout, instead of a user-action timeout. Of course this should be done with a command line option on the daemon to not change the default behaviour. My C is a bit rusty, but I can help with adding one of the features, I would just like to know some of your thoughts on this issue. Thanks a lot, - Thijs