[Bug] Fix Date-Time Parsing in Token Expiration Calculation for Multiple Formats #7393
Labels
bug-unconfirmed
A reported bug that needs to be investigated and confirmed
confidential-client
Issues regarding ConfidentialClientApplications
more-information-needed
Use this label when you are waiting on information from the issue creator
msal-node
Related to msal-node package
question
Customer is asking for a clarification, use case or information.
Core Library
MSAL.js (@azure/msal-node)
Core Library Version
latest
Public or Confidential Client?
Confidential
Description
The method responsible for calculating token expiration (expires_on) in MSAL (Managed Identity) is not handling various date-time formats correctly. This leads to errors or incorrect results when processing expiration times in different formats provided by the Managed Identity service.
more info : AzureAD/microsoft-authentication-library-for-dotnet#4963
Error Message
No response
MSAL Logs
No response
Network Trace (Preferrably Fiddler)
MSAL Configuration
Relevant Code Snippets
Reproduction Steps
Added parsing logic for Unix timestamps, ISO 8601
Expected Behavior
Added parsing logic for Unix timestamps, ISO 8601
Identity Provider
Entra ID (formerly Azure AD) / MSA
Browsers Affected (Select all that apply)
None (Server)
Regression
No response
The text was updated successfully, but these errors were encountered: