Session timeouts for Office 365
Session lifetimes are an important part of authentication for Office 365 and are an important component in balancing security and the number of times users are prompted for their credentials.
Session times for Office 365 services
When users authenticate in any of the Office 365 web apps or mobile apps, a session is established. For the duration of the session, users won't need to re-authenticate. Sessions can expire when users are inactive, when they close the browser or tab, or when their authentication token expires for other reasons such as when their password has been reset. The Office 365 services have different session timeouts to correspond with the typical use of each service.
The following table lists the session lifetimes for Office 365 services:
|Office 365 service||Session timeout|
|Office 365 Admin center
||You are asked to provide credentials for the admin center every 8 hours.
||5 days of inactivity as long as the users chooses Keep me signed in. If the user accesses SharePoint Online again after 24 or more hours have passed from the previous sign-in, the timeout value is reset to 5 days.
|Outlook Web App
You can change this value by using the ActivityBasedAuthenticationTimeoutInterval parameter in the Set-OrganizationConfig cmdlet.
|Azure Active Directory
(Used by Office 2013 Windows clients with modern authentication enabled)
|Modern authentication uses access tokens and refresh tokens to grant user access to Office 365 resources using Azure Active Directory. An access token is a JSON Web Token provided after a successful authentication and is valid for 1 hour. A refresh token with a longer lifetime is also provided. When access tokens expire, Office clients use a valid refresh token to obtain a new access token. This exchange succeeds if the user's initial authentication is still valid.
Refresh tokens are valid for 90 days, and with continuous use, they can be valid until revoked.
Refresh tokens can be invalidated by several events such as :
User's password has changed since the refresh token was issued.
An administrator can apply conditional access policies which restrict access to the resource the user is trying to access.
|SharePoint and OneDrive mobile apps for Android, iOS, and Windows 10
||The default lifetime for the access token is 1 hour. The default max inactive time of the refresh token is 90 days.
Learn more about tokens and how to configure token lifetimes
To revoke the refresh token, you can reset the user's Office 365 password
|Yammer with Office 365 Sign-In
||Lifetime of the browser. If users close the browser and access Yammer in a new browser, Yammer will re-authenticate them with Office 365. If users use third-party browsers that cache cookies, they may not need to re-authenticate when they reopen the browser.
> [!NOTE]> This is valid only for networks using Office 365 Sign-In for Yammer.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.