Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AAD: Revoke / Invalidate access tokens #12717

Closed
drinkbird opened this issue Aug 1, 2018 · 8 comments
Closed

AAD: Revoke / Invalidate access tokens #12717

drinkbird opened this issue Aug 1, 2018 · 8 comments

Comments

@drinkbird
Copy link

drinkbird commented Aug 1, 2018

Example: A client application uses the OAuth 2.0 code grant flow to obtain an access token. Once the user is done with their work, the "logout" action needs to invalidate the access token.


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

@AdamS-MSFT
Copy link
Member

@drinkbird Thank you for the valuable feedback,we are investigating the issue.

@MohitGargMSFT MohitGargMSFT removed their assignment Aug 2, 2018
@MohitGargMSFT
Copy link
Member

@drinkbird Unfortunately currently we don't have a specific revocation API. However, you can set access token lifetime based on your requirement. Please refer to this document for the same - Azure Active Directory v2.0 tokens reference.

Also please upvote below Azure Feedback request regarding Invalidate JWT Token. This will allow the product team to further prioritize it and include into their plans.

https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/19474918-invalidate-jwt-token

@MohitGargMSFT
Copy link
Member

@drinkbird We will now proceed to close this thread. If there are further questions regarding this matter, please open a new issue and we will gladly continue the discussion.

@drinkbird
Copy link
Author

Thank you for your response @MohitGargMSFT

@thadwoodman
Copy link

Unfortunately currently we don't have a specific revocation API. However, you can set access token lifetime based on your requirement.

Thanks for clarifying. Along similar lines, I'm wondering if it's possible for a third party to disconnect their app from a users account? Will "logging out" have that effect?

@dterei
Copy link

dterei commented Oct 10, 2018

@MohitGargMSFT What exactly does deleting the OAuth2PermissionGrant entity for the user do? Will it revoke the refresh token?

@rahulshukla422
Copy link

Thanks for clarifying. Along similar lines, I'm wondering if it's possible for a third party to disconnect their app from a users account? Will "logging out" have that effect?

No it will not log out since i am also facing the same issue where after logout from the application old request are still valid

@iotrock
Copy link

iotrock commented Nov 16, 2022

@MohitGargMSFT Still after logout access token remain active as per default lifetime set by azure active directory which is 60 min. Now how can we invalidate token after logout ?? Thanks for any valuable suggestion

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

8 participants