Skip to content

Commit 94219bf

Browse files
committed
Learn Editor: Update policy-keys-overview.md
1 parent 877c21f commit 94219bf

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed
132 KB
Loading

articles/active-directory-b2c/policy-keys-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,13 @@ If an Azure AD B2C keyset has multiple keys, only one of the keys is active at a
7272
- The key activation is based on the **activation date**.
7373
- The keys are sorted by activation date in ascending order. Keys with activation dates further into the future appear lower in the list. Keys without an activation date are located at the bottom of the list.
7474
- When the current date and time is greater than a key's activation date, Azure AD B2C will activate the key and stop using the prior active key.
75-
- When the current key's expiration time has elapsed and the key container contains a new key with valid *nbf (not before)* and *exp (expiration)* times, the new key will become active automatically. New tokens will be signed with the newly active key. It is possible to keep an expired key published for token validation until disabled by an admin, but this must be requested by [filing a support request](https://learn.microsoft.com/en-us/azure/active-directory-b2c/find-help-open-support-ticket).
75+
- When the current key's expiration time has elapsed and the key container contains a new key with valid *nbf (not before)* and *exp (expiration)* times, the new key will become active automatically. New tokens will be signed with the newly active key. It is possible to keep an expired key published for token validation until disabled by an admin, but this must be requested by [filing a support request](/azure/active-directory-b2c/find-help-open-support-ticket).
7676

7777
- When the current key's expiration time has elapsed and the key container *does not* contain a new key with valid *not before* and *expiration* times, Azure AD B2C won't be able to use the expired key. Azure AD B2C will raise an error message within a dependant component of your custom policy. To avoid this issue, you can create a default key without activation and expiration dates as a safety net.
7878
- The key's endpoint (JWKS URI) of the OpenId Connect well-known configuration endpoint reflects the keys configured in the Key Container, when the Key is referenced in the [JwtIssuer Technical Profile](./jwt-issuer-technical-profile.md). An application using an OIDC library will automatically fetch this metadata to ensure it uses the correct keys to validate tokens. For more information, learn how to use [Microsoft Authentication Library](../active-directory/develop/msal-b2c-overview.md), which always fetches the latest token signing keys automatically.
7979

80+
![A diagram describing the process for key rollover in Azure AD B2C.](media/policy-keys-overview/key-rollover.png)
81+
8082
## Key caching
8183

8284
When a key is uploaded, the activation flag on the key is set to false by default. You can then set the state of this key to **Enabled**. If a key enabled and valid (current time is between NBF and EXP), then the key will be used.

0 commit comments

Comments
 (0)