You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/concept-fundamentals-continuous-access-evaluation.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Continuous access evaluation in Azure AD
3
-
description: Resonding to changes in user state faster with continuous access evaluation in Azure AD
3
+
description: Responding to changes in user state faster with continuous access evaluation in Azure AD
4
4
5
5
services: active-directory
6
6
ms.service: active-directory
@@ -27,7 +27,7 @@ Because the security benefits are so great, we are rolling out a Microsoft-speci
27
27
28
28
## How does CAE work in Microsoft services?
29
29
30
-
We are focusing our initial implementation to continuous access evaluation in Exchange and Teams. We hope to expand support to other Microsoft services in the future. We will start to enable continuous access evaluation only for tenants with no Conditional Access policies. We will use our learnings from this phase of CAE to inform our ongoing rollout of CAE.
30
+
We are focusing our initial implementation of continuous access evaluation to Exchange and Teams. We hope to expand support to other Microsoft services in the future. We will start to enable continuous access evaluation only for tenants with no Conditional Access policies. We will use our learnings from this phase of CAE to inform our ongoing rollout of CAE.
31
31
32
32
## Service side requirements
33
33
@@ -55,28 +55,30 @@ Before continuous access evaluation, clients would always try to replay the acce
55
55
56
56
## Token Lifetime
57
57
58
-
Because risk and policy are evaluated in real time, clients that negotiate continuous access evaluation aware sessions will rely on CAE instead of existing static access token lifetime policies, which means that configurable token lifetime policy will not be honored anymore for enlightened clients that negotiate CAE-aware sessions.
58
+
Because risk and policy are evaluated in real time, clients that negotiate continuous access evaluation aware sessions will rely on CAE instead of existing static access token lifetime policies, which means that configurable token lifetime policy will not be honored anymore for CAE-capable clients that negotiate CAE-aware sessions.
59
59
60
60
We will increase access token lifetime to 24 hours in CAE sessions. Revocation is driven by critical events and policy evaluation, not an arbitrary time period. This change increases the stability of your applications without affecting your security posture.
61
61
62
62
## Example flows
63
63
64
64
### User revocation event flow:
65
-
66
-
1. An enlightened client presents credentials or a refresh token to AAD asking for an access token for some resource.
1. A CAE-capable client presents credentials or a refresh token to AAD asking for an access token for some resource.
67
69
1. An access token is returned along with other artifacts to the client.
68
70
1. An Administrator explicitly [revokes all refresh tokens for the user](https://docs.microsoft.com/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0). A revocation event will be sent to the resource provider from Azure AD.
69
71
1. An access token is presented to the resource provider. The resource provider evaluates the validity of the token and checks whether there is any revocation event for the user. The resource provider uses this information to decide to grant access to the resource or not.
70
72
1. In this case, the resource provider denies access, and sends a 401+ claim challenge back to the client
71
-
1. The enlightened client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD will then reevaluate all the conditions and prompt the user to reauthenticate in this case.
73
+
1. The CAE-capable client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD will then reevaluate all the conditions and prompt the user to reauthenticate in this case.
72
74
73
75
## FAQs
74
76
75
77
### What is the lifetime of my Access Token?
76
78
77
-
If you are not using enlightened clients, your default Access Token lifetime will still be 1 hour unless you have configured your Access Token lifetime with the [Configurable Token Lifetime (CTL)](../develop/active-directory-configurable-token-lifetimes.md) preview feature.
79
+
If you are not using CAE-capable clients, your default Access Token lifetime will still be 1 hour unless you have configured your Access Token lifetime with the [Configurable Token Lifetime (CTL)](../develop/active-directory-configurable-token-lifetimes.md) preview feature.
78
80
79
-
If you are using enlightened clients that negotiate CAE-aware sessions, your CTL settings for Access Token lifetime will be overwritten and Access Token lifetime will be 24 hours.
81
+
If you are using CAE-capable clients that negotiate CAE-aware sessions, your CTL settings for Access Token lifetime will be overwritten and Access Token lifetime will be 24 hours.
80
82
81
83
### How quick is enforcement?
82
84
@@ -88,4 +90,4 @@ Sign-in Frequency will be honored with or without CAE.
0 commit comments