Hello @Bryan !
Welcome to Microsoft QnA!
Here are some details on your query :
Noninteractive authentication can only be used after an interactive authentication has taken place. During noninteractive authentication, the user does not input logon data, instead, previously established credentials are used.
Noninteractive authentication is performed when an application uses the Security Support Provider Interface (SSPI) and a security package to establish a secure network connection. Noninteractive authentication is the mechanism at work when a user connects to multiple machines on a network without having to re-enter logon information for each machine. For example, if an application needs to open a secure folder on a remote machine and the application user is already interactively logged on to a domain account, the application does not require the user to supply logon data again. Instead, the application can request a noninteractive authentication by using SSPI to pass the previously established security information to a security package. The security package then uses LSA functions to check the credentials. The following diagram illustrates this procedure.
Link : https://learn.microsoft.com/en-us/windows/win32/secauthn/noninteractive-authentication
Also :
When you reset a user's password in Azure Active Directory (AAD), it does not automatically revoke the existing tokens issued to the user. The tokens are typically valid until their expiration time, regardless of whether the user's password has been reset.
To ensure that the user is prompted to authenticate again and obtain new tokens after a password reset, you can employ one or both of the following approaches:
*Set the "forcePasswordChange" flag: When resetting the user's password, you can set the "forcePasswordChange" flag to true. This flag will prompt the user to change their password upon their next sign-in, effectively invalidating their existing tokens. The user will be required to provide the new password during the next authentication.*
*Use token revocation: You can implement token revocation in your application to explicitly revoke the user's existing tokens after a password reset. To achieve this, you can use the Azure AD Graph API or Microsoft Graph API to revoke the tokens associated with the user. By revoking the tokens, the user will be required to sign in again and obtain new tokens.*
It's worth noting that revoking tokens may impact the user's experience, as they will need to re-authenticate and obtain new tokens for all the applications they were previously signed in to. Consider the implications and user experience when deciding to revoke tokens after a password reset.
Additionally, keep in mind that the approach for revoking tokens may differ depending on the specific identity platform or authentication library you are using in your application. Consult the documentation or resources provided by the identity platform or library to understand the recommended approach for token revocation in your specific context.
I hope this helps!
The answer or portions of it may have been assisted by AI Source: ChatGPT Subscription
Kindly mark the answer as Accepted and Upvote in case it helped!
Regards