Skip to content

Commit 2f391bc

Browse files
Updates
1 parent 043b8d2 commit 2f391bc

File tree

2 files changed

+11
-9
lines changed

2 files changed

+11
-9
lines changed

articles/active-directory/fundamentals/concept-fundamentals-continuous-access-evaluation.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Continuous access evaluation in Azure AD
3-
description: Resonding to changes in user state faster with continuous access evaluation in Azure AD
3+
description: Responding to changes in user state faster with continuous access evaluation in Azure AD
44

55
services: active-directory
66
ms.service: active-directory
@@ -27,7 +27,7 @@ Because the security benefits are so great, we are rolling out a Microsoft-speci
2727

2828
## How does CAE work in Microsoft services?
2929

30-
We are focusing our initial implementation to continuous access evaluation in Exchange and Teams. We hope to expand support to other Microsoft services in the future. We will start to enable continuous access evaluation only for tenants with no Conditional Access policies. We will use our learnings from this phase of CAE to inform our ongoing rollout of CAE.
30+
We are focusing our initial implementation of continuous access evaluation to Exchange and Teams. We hope to expand support to other Microsoft services in the future. We will start to enable continuous access evaluation only for tenants with no Conditional Access policies. We will use our learnings from this phase of CAE to inform our ongoing rollout of CAE.
3131

3232
## Service side requirements
3333

@@ -55,28 +55,30 @@ Before continuous access evaluation, clients would always try to replay the acce
5555

5656
## Token Lifetime
5757

58-
Because risk and policy are evaluated in real time, clients that negotiate continuous access evaluation aware sessions will rely on CAE instead of existing static access token lifetime policies, which means that configurable token lifetime policy will not be honored anymore for enlightened clients that negotiate CAE-aware sessions.
58+
Because risk and policy are evaluated in real time, clients that negotiate continuous access evaluation aware sessions will rely on CAE instead of existing static access token lifetime policies, which means that configurable token lifetime policy will not be honored anymore for CAE-capable clients that negotiate CAE-aware sessions.
5959

6060
We will increase access token lifetime to 24 hours in CAE sessions. Revocation is driven by critical events and policy evaluation, not an arbitrary time period. This change increases the stability of your applications without affecting your security posture.
6161

6262
## Example flows
6363

6464
### User revocation event flow:
65-
66-
1. An enlightened client presents credentials or a refresh token to AAD asking for an access token for some resource.
65+
66+
![User revocation event flow](./media/concept-fundamentals-continuous-access-evaluation/user-revocation-event-flow.png)
67+
68+
1. A CAE-capable client presents credentials or a refresh token to AAD asking for an access token for some resource.
6769
1. An access token is returned along with other artifacts to the client.
6870
1. An Administrator explicitly [revokes all refresh tokens for the user](https://docs.microsoft.com/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0). A revocation event will be sent to the resource provider from Azure AD.
6971
1. An access token is presented to the resource provider. The resource provider evaluates the validity of the token and checks whether there is any revocation event for the user. The resource provider uses this information to decide to grant access to the resource or not.
7072
1. In this case, the resource provider denies access, and sends a 401+ claim challenge back to the client
71-
1. The enlightened client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD will then reevaluate all the conditions and prompt the user to reauthenticate in this case.
73+
1. The CAE-capable client understands the 401+ claim challenge. It bypasses the caches and goes back to step 1, sending its refresh token along with the claim challenge back to Azure AD. Azure AD will then reevaluate all the conditions and prompt the user to reauthenticate in this case.
7274

7375
## FAQs
7476

7577
### What is the lifetime of my Access Token?
7678

77-
If you are not using enlightened clients, your default Access Token lifetime will still be 1 hour unless you have configured your Access Token lifetime with the [Configurable Token Lifetime (CTL)](../develop/active-directory-configurable-token-lifetimes.md) preview feature.
79+
If you are not using CAE-capable clients, your default Access Token lifetime will still be 1 hour unless you have configured your Access Token lifetime with the [Configurable Token Lifetime (CTL)](../develop/active-directory-configurable-token-lifetimes.md) preview feature.
7880

79-
If you are using enlightened clients that negotiate CAE-aware sessions, your CTL settings for Access Token lifetime will be overwritten and Access Token lifetime will be 24 hours.
81+
If you are using CAE-capable clients that negotiate CAE-aware sessions, your CTL settings for Access Token lifetime will be overwritten and Access Token lifetime will be 24 hours.
8082

8183
### How quick is enforcement?
8284

@@ -88,4 +90,4 @@ Sign-in Frequency will be honored with or without CAE.
8890

8991
## Next steps
9092

91-
Announcing continuous access evaluation
93+
[Announcing continuous access evaluation](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/moving-towards-real-time-policy-and-security-enforcement/ba-p/1276933)
Loading

0 commit comments

Comments
 (0)