For Azure Point-to-Site (P2S) VPN connections using Microsoft Entra ID authentication, there are specific considerations regarding session and idle timeout policies:
- Session Lifetime and Idle Disconnect Timeout: The default lifetime for refresh tokens used in Microsoft Entra ID authentication is 90 days. However, the refresh tokens can expire sooner based on conditional access policies set by your Entra tenant administrators. These policies can enforce reauthentication every few hours, which effectively impacts session continuity.
- Extending Timeout Duration: To ensure continuous operation for your users, you can work with your Entra tenant administrators to adjust the sign-in frequency by adding conditional access policies. This can help extend the refresh token expiration interval, allowing for longer sessions. For detailed guidance on configuring these settings, you can refer to the Microsoft documentation on Refresh tokens in the Microsoft identity platform and Configure adaptive session lifetime policies.
For specific configurations on your VPN Gateway or vWAN setup, you may need to verify the settings directly in the Azure portal or through Azure PowerShell commands.
References: