Seamless User Authentication with Refresh Tokens in Prisma Access Agent
Focus
Focus
Prisma Access Agent

Seamless User Authentication with Refresh Tokens in Prisma Access Agent

Table of Contents
Prisma Access Agent uses refresh tokens for efficient authentication to reduce login frequency while maintaining security.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access 5.1 Preferred or Innovation
  • Prisma Access license with the Mobile User subscription
  • Prisma Access Agent version: 25.1.0.14
  • macOS 14 and later or Windows 10 version 2024 and later desktop devices
  • Contact your Palo Alto Networks account representative to activate the Prisma Access Agent feature
Prisma Access Agent uses refresh tokens to streamline authentication for users, minimizing disruptions to their work. When a user's access token expires, the refresh token automatically obtains a new one without requiring user intervention. This process occurs in the background, ensuring uninterrupted access to cloud and on-premises resources for mobile users and remote offices.
By default, the refresh token has a 7-day lifetime, enabling secure access without frequent logins. Users receive a notification on their Prisma Access Agent app 60 minutes before token expiration.

Notification Process

The user is notified of the impending token expiration based on what is configured in the Notify Before Session Expires and Session Timeout Expiration Message setting in the Prisma Access Agent app settings. If that Notify Before Session Expires option is set to 0, the agent will default to 60 minutes.
For example, 60 minutes before token expiration, the user will receive a notification pop-up from their system tray. The following image is an example of the pop-up on a macOS desktop device.
When they click on the pop-up, the Prisma Access Agent app opens showing the notification bar at the bottom of the window. The user merely has to click on the notification bar to start a new session.
If the user's identity provider (IdP) session is active, authentication with the agent continues without user action. In the background, when the user clicks the notification, the agent disconnects the tunnel, reauthenticates with the server, gets a new gateway token, and reestablishes the tunnel.
For expired IdP sessions, users will need to complete the SAML authentication flow to renew their session. A web browser will open to redirect the user to their organization’s IdP login page where they can proceed with authenticating with their organization.
After successful authentication, the user will be connected to the Prisma Access Agent.