Saturday, June 3, 2017

Session timeouts for Office 365

Session timeouts for Office 365

Session lifetimes are an important part of authentication for Office 365 and are an important component in balancing security and the number of times users are prompted for their credentials.

Session times for Office 365 services

When users authenticate in any of the Office 365 web apps or mobile apps, a session is established. For the duration of the session, users won't need to re-authenticate. Sessions can expire when users are inactive, when they close the browser or tab, or when their authentication token expires for other reasons such as when their password has been reset. The Office 365 services have different session timeouts to correspond with the typical use of each service.

The following table lists the session lifetimes for Office 365 services:

Office 365 service

Session timeout

SharePoint Online

5 days of inactivity as long as the users chooses Keep me signed in. Each time a user accesses SharePoint Online, the timeout value is reset to 5 days. For more information, see SharePoint Online authentication.

Outlook Web App

6 hours.

You can change this value by using the ActivityBasedAuthenticationTimeoutInterval parameter in the Set-OrganizationConfig cmdlet.

Azure Active Directory

(Used by Office 2013 Windows clients with modern authentication enabled)

Modern authentication uses access tokens and refresh tokens to grant uses access to Office 365 resources using Azure Active Directory. An access token is a JSON Web Token provided after a successful authentication and is valid for 1 hour. A refresh token with a longer lifetime is also provided. When access tokens expire, Office clients use a valid refresh token to obtain a new access token. This exchange succeeds if the user's initial authentication is still valid.

Refresh tokens are valid for 14 days, and with continuous use, they can be valid up to 90 days. After 90 days, users will be asked to re-authenticate.

Refresh tokens can be invalidated by several events such as :

  • User's password has changed since the refresh token was issued.

  • An administrator can apply conditional access policies which restrict access to the resource the user is trying to access.

SharePoint and OneDrive mobile apps for Android, iOS, and Windows 10

The default lifetime for the access token is 1 hour. The default max inactive time of the refresh token is 90 days.

Learn more about tokens and how to configure token lifetimes

To revoke the refresh token, you can reset the user's Office 365 password

Yammer with Office 365 Sign-In

Lifetime of the browser. If users close the browser and access Yammer in a new browser, Yammer will re-authenticate them with Office 365. If users use third-party browsers that cache cookies, they may not need to re-authenticate when they reopen the browser.

Note: This is valid only for networks using Office 365 Sign-In for Yammer.

No comments:

Post a Comment