How to set idle timeout on Microsoft External ID

Machado, Eduardo 40 Reputation points
2025-08-01T20:47:49.4633333+00:00

I've configured Entra External ID with PowerPages following Microsoft documentation (link below) and I want to know how the session/idle timeout is configured. Is it on Entra, PowerPages or both?

https://learn.microsoft.com/en-us/power-pages/security/authentication/entra-external-id

Thanks!

Microsoft Security | Microsoft Entra | Microsoft Entra External ID
{count} votes

1 answer

Sort by: Most helpful
  1. Sreetheja Adusumilli 0 Reputation points Microsoft External Staff
    2025-08-13T07:12:55.6933333+00:00

    Hello Machado, Eduardo
    Thanks for reaching out to Microsoft Q&A.
    When you connect Entra External ID (formerly Azure AD External Identities) to Power Pages, session and idle timeout settings are handled in two places:

    Entra External ID – Controls how long authentication tokens last.

    Power Pages – Controls how long the site keeps a user logged in before kicking them out for being idle.

    Right now, Entra External ID has some restrictions:

    • You can’t customize session timeouts or token expiry for External ID users the same way you can for normal Azure AD users.
    • Token policies for refresh tokens were retired in 2021. - https://learn.microsoft.com/en-us/entra/identity-platform/configurable-token-lifetimes
    • Conditional Access Session policies don’t work with External ID tenants.
    • If you use Email OTP (one-time passcode) login, the refresh token always lasts 12 hours — you can’t change that.
    • Access tokens typically last around 60–90 minutes.

    Document Reference: https://learn.microsoft.com/en-us/entra/external-id/customers/concept-supported-features-customers

    Set the Timeout : You’ll mostly control session timeout from the Power Pages settings, because Entra External ID doesn’t give much flexibility for external guest accounts.

    To Configure Timeout in Power Pages

    • Open Power Platform Admin Center → Go to your Power Pages environment.
    • Open the Portal Management App.
    • Go to Website > Site Settings. Add the following:
    • Idle Timeout
    text
    Name: Authentication/ApplicationCookie/ExpireTimeSpan  
    Value: 00:10:00  → means 10 minutes of inactivity
    
    • After Timeout Redirect Page
    text
    Name: Authentication/ApplicationCookie/LoginPath  
    Value: /SignIn  → page where users will be sent after timeout
    
    • Match Entra Token Lifetime (Optional)
           Name: Authentication/OpenIdConnect/[provider]/UseTokenLifetime
           Value: true (to sync with Entra token lifetime)
      

    Settings on Entra Side (Limited Impact)

    • In Entra Admin Center → Go to Settings → Signing out + notifications → turn on directory-level idle timeout.
    • But note: This mainly affects the Entra portal, not the external Power Pages login.

    Reference Documentation:

    Areas for Optimization

    • If using Email OTP: Remember the refresh token will always expire after 12 hours.
    • If you want more control, switch to username/password login in Entra External ID.
    • Add client-side timeout warnings (e.g., a pop-up saying “Your session will expire soon”).
    • Balance security and user experience by choosing reasonable timeouts (5–10 mins is strict, 15–30 mins is relaxed).

    Suggested Process:

    • Set the timeout in Power Pages (main control point).
    • Test by logging in and leaving the session idle.
    • Check if users are redirected to the login page after the set time.
    • Monitor user and token logs in Entra.

    Please Note:

    • Power Pages controls your site session timeout.
    • Entra External ID controls token expiry, but has strict limits for Email OTP.

    Kindly let us know if the above helps or you need further assistance on this issue.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.