Skip to content

Commit 84a9fd5

Browse files
Merge pull request #211716 from cemateia/update-docs-custom-token-expiration
Update identity-model.md for custom token expiration feature
2 parents e0ac7e7 + 25fa5b8 commit 84a9fd5

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/communication-services/concepts/identity-model.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,9 @@ The properties of an access token are:
5656
* Expiration.
5757
* Scopes.
5858

59-
An access token is always valid for 24 hours. After it expires, the access token is invalidated and can't be used to access any primitive.
59+
An access token is valid for a period of time between 1 and 24 hours. After it expires, the access token is invalidated and can't be used to access any primitive.
60+
To generate a token with a custom validity, specify the desired validity period when generating the token. If no custom validity is specified, the token will be valid for 24 hours.
61+
We recommend using short lifetime tokens for one-off meetings and longer lifetime tokens for agents using the application for longer periods of time.
6062

6163
An identity needs a way to request a new access token from a server-side service. The *scope* parameter defines a nonempty set of primitives that can be used. Azure Communication Services supports the following scopes for access tokens.
6264

0 commit comments

Comments
 (0)