Hello @Drew , Azure AD does not support long lived tokens. Refresh tokens have a default value of 90 days, 24 hours if they are issued to an SPA. You can however create your own PAT implementation using application (service principal) authentication. Keep in mind this involves high level permissions so be careful with the operations allowed. Basically, your (coded) application would generate, accept and manage (store, refresh, revoke, etc.) lifetime for PAT tokens for your B2B users. All operations on their behalf would be done using application permissions in tandem with MS Graph. Optionally you might try Conditional Access for workload identities (in preview) to secure access for server-to-server scenarios like the aforementioned.
Let us know if this answer was helpful to you or if you need additional assistance. If it was helpful, please remember to accept it so that others in the community with similar questions can more easily find a solution.