I have a java spring security app that authenticates against Azure AD with SAML. With default settings, when the token is returned from MS back to my apps, the "notOnOrAfter" date is in the past, regardless when the user actually logged into their Microsoft account.
I have added forceAuthN=true
parameter - this solved the issue of expired tokens, however at the expense of having to re-enter the username/password on every login request. Now the users are asking why they have to re-login in for my app when this works seamlessly for other apps they use that authenticate to Azure AD.
I tried playing around with different values for forceAuthN
and passive
- but still no luck.
Is there anything I can do (either in my application or in the setup of then enterprise application in Azure AD) to get seamless login working?