Azure AD Joined Authentication Question

Dalton Reeves 146 Reputation points
2023-02-23T22:42:06.4433333+00:00

Feb 1: User's account was checked in Active Directory to "User must change password at next logon".

Every day since then the user had the following entry in Sign-Ins in AAD

User's image

User's image

AND

	
The user's password is expired, and therefore their login or session was ended. They will be offered the opportunity to reset it, or may ask an admin to reset it via
  • User was still able to get into Outlook and send emails, use SSO'd apps etc. User has MFA enforced on the account, etc.
  • The laptop is an Azure AD Joined machine provisioned by Auto Pilot just like any other device.

There's no foul play here, I just can't wrap my head around how besides using Windows Hello for Business to get into her laptop that she was still able to access email, and other SSO'd apps without ever authenticating again. She sent multiple emails yesterday no issue. Yet I don't even see a login INTO Office or anything for yesterday for her. I don't even see the Windows Sign In entry for yesterday at all and due to CA policies that I know for a fact work, she couldn't use email from any other device besides this one.

As we speak I took a test computer with a test user identical to this user and when I log into it with Windows Hello, I have yet to get the Windows Sign In entry. Not to mention I flipped the user in AD to the same "Usesr must change password at next logon"

We have writeback and SSPR and it works.

Does Windows Hello for Business just extend the authentication token thus allowing the end user to continue to access Office and other SSO'd apps? Could this person in theory have just kept on keeping on this way indefinitely or in 30 days from Feb 1 would it finally of come to a halt?

Windows for business | Windows Client for IT Pros | Devices and deployment | Configure application groups
Microsoft Security | Microsoft Entra | Microsoft Entra ID
Windows for business | Windows Client for IT Pros | User experience | Other
Microsoft Security | Intune | Other
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Vasil Michev 123.6K Reputation points MVP Volunteer Moderator
    2023-02-24T07:11:31.6833333+00:00

    That's because each application uses its own set of refresh/access tokens, and the validity of the former can be 90+ days. When a fresh token is requested, i.e. when you try to login to a new device, she will be asked to enter a new password. If an existing token is found and is still valid, she can continue accessing the app for some time. Similarly, on a AAD joined device the PRT has a validity of 14 days.

    As an admin, you can revoke all tokens if needed. And if you are worried about security implications of token expiration in general, consider the Continuous access evaluation feature: https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-continuous-access-evaluation


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.