Skip to content

Commit 16a7821

Browse files
authored
Merge pull request #106198 from hpsin/patch-54
clarify refresh token docs
2 parents 529ebf1 + 7369cdc commit 16a7821

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/active-directory/develop/access-tokens.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/22/2019
12+
ms.date: 3/2/2020
1313
ms.author: ryanwi
1414
ms.reviewer: hirsin
1515
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
@@ -237,6 +237,8 @@ Refresh tokens can be invalidated or revoked at any time, for different reasons.
237237

238238
### Token timeouts
239239

240+
Using [token lifetime configuration](active-directory-configurable-token-lifetimes.md), the lifetime of refresh tokens can be altered. It is normal and expected for some tokens to go without use (e.g. the user does not open the app for 3 months) and therefore expire. Apps will encounter scenarios where the login server rejects a refresh token due to its age.
241+
240242
* MaxInactiveTime: If the refresh token hasn't been used within the time dictated by the MaxInactiveTime, the Refresh Token will no longer be valid.
241243
* MaxSessionAge: If MaxAgeSessionMultiFactor or MaxAgeSessionSingleFactor have been set to something other than their default (Until-revoked), then reauthentication will be required after the time set in the MaxAgeSession* elapses.
242244
* Examples:
@@ -245,6 +247,8 @@ Refresh tokens can be invalidated or revoked at any time, for different reasons.
245247

246248
### Revocation
247249

250+
Refresh tokens can be revoked by the server due to a change in credentials, or due to use or admin action. Refresh tokens fall into two classes - those issued to confidential clients (the rightmost column) and those issued to public clients (all other columns).
251+
248252
| | Password-based cookie | Password-based token | Non-password-based cookie | Non-password-based token | Confidential client token |
249253
|---|-----------------------|----------------------|---------------------------|--------------------------|---------------------------|
250254
| Password expires | Stays alive | Stays alive | Stays alive | Stays alive | Stays alive |
@@ -260,7 +264,7 @@ Refresh tokens can be invalidated or revoked at any time, for different reasons.
260264
>
261265
> Primary Refresh Tokens (PRT) on Windows 10 are segregated based on the credential. For example, Windows Hello and password have their respective PRTs, isolated from one another. When a user signs-in with a Hello credential (PIN or biometrics) and then changes the password, the password based PRT obtained previously will be revoked. Signing back in with a password invalidates the old PRT and requests a new one.
262266
>
263-
> Refresh tokens aren't invalidated or revoked when used to fetch a new access token and refresh token.
267+
> Refresh tokens aren't invalidated or revoked when used to fetch a new access token and refresh token. However, your app should discard the old one as soon as it's used and replace it with the new one, as the new token has a new expiration time in it.
264268
265269
## Next steps
266270

0 commit comments

Comments
 (0)