[Bug] Fix Date-Time Parsing in Token Expiration Calculation for Multiple Formats #7393
Labels
bug
A problem that needs to be fixed for the feature to function as intended.
confidential-client
Issues regarding ConfidentialClientApplications
msal-node
Related to msal-node package
p2
P1 and P2 are priorities of the bug. P2 bugs should get fixed/closed within 3 months.
Core Library
MSAL.js (@azure/msal-node)
Core Library Version
latest
Public or Confidential Client?
Confidential
Description
The method responsible for calculating token expiration (expires_on) in MSAL (Managed Identity) is not handling various date-time formats correctly. This leads to errors or incorrect results when processing expiration times in different formats provided by the Managed Identity service.
more info : AzureAD/microsoft-authentication-library-for-dotnet#4963
Error Message
No response
MSAL Logs
No response
Network Trace (Preferrably Fiddler)
MSAL Configuration
Relevant Code Snippets
Reproduction Steps
Added parsing logic for Unix timestamps, ISO 8601
Expected Behavior
Added parsing logic for Unix timestamps, ISO 8601
Identity Provider
Entra ID (formerly Azure AD) / MSA
Browsers Affected (Select all that apply)
None (Server)
Regression
No response
The text was updated successfully, but these errors were encountered: