What problem are you observing?
The HTTP answer from the https://tenant.api.identitynow.com/oauth/token?grant_type=client_credentials
has the attribute expires_in
set to 2147483646
.
According to Authentication | SailPoint Developer Community
The
expires_in
value describes the lifetime, in seconds, of theaccess_token
This means the token expires in 68 years.
The JWT access_token
(when decoded) contains a similar long exp
:
I think that either
- the values presented are incorrect (and the actual expiration is much shorter)
- or the value is way too long from a standard security practice
What is the correct behavior?
The expiration token should be shorter. Colin mentions something about 30 days here: Implementing A Request Response Type Trigger in Workflows
This will produce an
access_token
that expires every 30 days.
His access token had the same large expires_in
return value:
What product feature is this related to?
Generating access tokens for ISC.
What are the steps to reproduce the issue?
From Colin’s post:
- Start by creating a new workflow that is triggered by an external trigger. Click the “New Access Token” button to get the client credentials used to authenticate to the workflow
- Use the command presented in the UI:
curl -H "Authorization: Basic NzU...." -X POST "https://tenant.api.identitynow.com/oauth/token?grant_type=client_credentials"
- Check the
expires_in
. Check theexp
from theaccess_token
on jwt.io.
Do you have any other information about your environment that may help?
No.