Hi @Prapinwit Sricharoenvanich
Welcome to MS Q&A!
The default lifetime for refresh tokens is 24 hours for single-page applications and 90 days for other scenarios. Each time a refresh token is used, it is replaced with a new one. The Microsoft identity platform does not revoke old refresh tokens when they are used to obtain new access tokens.
You can revoke the refresh token in multiple ways, timeouts and revocations. your app must handle revocations by the sign-in service by sending the user to an interactive sign-in prompt to sign in again.
If there are significant changes to the account, such as a password reset or suspicious activity, the refresh token can be invalidated. Additionally, if the refresh token hasn't been used within its valid time frame, it is no longer valid.
on the other hand Entra ID refresh tokens can be revoked by a user using the AzureAD PowerShell Revoke-AzureADSignedInUserAllRefreshToken cmdlet or by an admin using the Revoke-AzureADUserAllRefreshToken cmdlet. For other instances when refresh tokens will get revoked during the device flow take a look to the password-and non-password based token columns of the Token revocations table.
For more information, please read Refresh tokens in the Microsoft identity platform.
Hope this helps. Do let us know if you any further queries by responding in the comments section.
Thanks,
Akhilesh.
If this answers your query, do click Accept Answer
and Yes
for was this answer helpful. And, if you have any further query do let us know.