You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, Hawk lacks robust session and token management, particularly for Microsoft Graph authentication. This leads to potential failures during long-running operations and requires manual intervention when sessions expire. A comprehensive session management system would eliminate these issues and improve reliability.
Proposed Solution
Implement an intelligent session/token management system that:
Proactively monitors token expiration
Automatically refreshes sessions before timeout
Handles different timeout windows for various services
Provides seamless recovery from connection issues
Key Session/Token Windows
Microsoft Graph Access Tokens
Default expiration: 1 hour (3600 seconds)
Cannot be configured by application
Most critical for Hawk's operation
Exchange Online PowerShell (EXO V3)
Default session timeout: 4 hours
Can be extended up to 24 hours with SessionOption
Auto-reconnection handled by module
Refresh Tokens
Default expiration: 90 days
Can be revoked via Azure AD
Cannot be extended
Technical Requirements
Token Monitoring
Track Microsoft Graph token expiration (1-hour window)
Access tokens: The default lifetime of an access token is variable. When issued, an access token's default lifetime is assigned a random value ranging between 60-90 minutes (75 minutes on average).
Re-prioritizing this as a low priority. In speaking with @T0pCyber this is not currently an problem / need, as the data pulled from the Graph shouldn't exceed an hour (default access token expiration in MSGraph). If this does end up being a need, highly recommned migrating from Graph authentication to MSAL auth, as MSAL is a libary that handles token / session management / refreshes. Documentation for this is located on the Hawk Confluence > Documentation > Current Research > Graph Authentication & Session Management Research.
What problem would this feature solve?
Currently, Hawk lacks robust session and token management, particularly for Microsoft Graph authentication. This leads to potential failures during long-running operations and requires manual intervention when sessions expire. A comprehensive session management system would eliminate these issues and improve reliability.
Proposed Solution
Implement an intelligent session/token management system that:
Key Session/Token Windows
Microsoft Graph Access Tokens
Exchange Online PowerShell (EXO V3)
Refresh Tokens
Technical Requirements
Token Monitoring
Session Management
Connection Handling
Implementation Approach
Session Tracking
Authentication Flow
Integration
Acceptance Criteria
The text was updated successfully, but these errors were encountered: