few-oyster-74399
07/04/2025, 6:40 AMbrief-egg-61061
07/04/2025, 6:40 AMbrief-egg-61061
07/04/2025, 6:40 AMory patch oauth2-config --project <project-id> --workspace <workspace-id> \ --replace "/ttl/refresh_token=\"900h\"" \ --format yaml
[Change refresh token lifespan](https://www.ory.sh/docs/oauth2-oidc/refresh-token-grant#change-refresh-token-lifespan) In summary: - You do not need user re-authentication to use a refresh token and obtain new tokens. - You cannot "extend" an existing refresh token's expiration; you can only configure the lifespan for new tokens. - The refresh token flow is designed for seamless, non-interactive token renewal as long as the refresh token is valid.few-oyster-74399
07/04/2025, 6:47 AMbrief-egg-61061
07/04/2025, 6:47 AMbrief-egg-61061
07/04/2025, 6:47 AMfew-oyster-74399
07/04/2025, 7:06 AMbrief-egg-61061
07/04/2025, 7:07 AMbrief-egg-61061
07/04/2025, 7:07 AMrevoke_active_sessions
hook. This forces re-authentication for all sessions, but it is not explicitly stated whether this also revokes OAuth2 refresh tokens [Invalidate other sessions](https://www.ory.sh/docs/kratos/self-service/flows/account-recovery-password-reset#invalidate-other-sessions). - For OAuth2, refresh tokens are invalidated if abuse is detected or if they are used more than once (unless a grace period is configured), but there is no direct mention of password change as a trigger for refresh token invalidation. In summary, based on the available documentation, it is not clearly specified that refresh tokens are invalidated on password change by default. You may need to implement session or token revocation logic explicitly if this behavior is required.