What problem are you observing?
The HTTP answer from the https://tenant.api.identitynow.com/oauth/token?grant_type=client_credentials has the attribute expires_in set to 2147483646.
According to Authentication | SailPoint Developer Community
The
expires_invalue describes the lifetime, in seconds, of theaccess_token
This means the token expires in 68 years.
The JWT access_token (when decoded) contains a similar long exp:
![]()
I think that either
- the values presented are incorrect (and the actual expiration is much shorter)
- or the value is way too long from a standard security practice
What is the correct behavior?
The expiration token should be shorter. Colin mentions something about 30 days here: Implementing A Request Response Type Trigger in Workflows
This will produce an
access_tokenthat expires every 30 days.
His access token had the same large expires_in return value:
What product feature is this related to?
Generating access tokens for ISC.
What are the steps to reproduce the issue?
From Colin’s post:
- Start by creating a new workflow that is triggered by an external trigger. Click the “New Access Token” button to get the client credentials used to authenticate to the workflow
- Use the command presented in the UI:
curl -H "Authorization: Basic NzU...." -X POST "https://tenant.api.identitynow.com/oauth/token?grant_type=client_credentials" - Check the
expires_in. Check theexpfrom theaccess_tokenon jwt.io.
Do you have any other information about your environment that may help?
No.
