Access Token Management
This guide explains how Medplum manages authentication tokens and how to implement secure token handling in your applications.
Access Tokens vs Refresh Tokens
Medplum uses two types of tokens to manage authentication securely:
Access Tokens are short-lived JSON Web Tokens (JWTs) that grant access to Medplum APIs. Each access token contains essential information about the user's permissions and session details. Every API request must include a valid access token.
Refresh Tokens are long-lived credentials used to obtain new access tokens without requiring the user to log in again. These tokens are stored securely by client applications and are only transmitted when requesting a new access token.
Requesting Refresh Tokens
Refresh tokens are not issued by default. To receive a refresh token, you must include one of the following scopes in your authentication request:
offline_access
offline
For example:
await medplum.startLogin({
email: 'admin@example.com',
password: 'password',
scope: 'openid offline_access',
});
await medplum.signInWithRedirect({
scope: 'openid offline_access',
});
Configuring Token Lifetimes
Default Token Lifetimes
Token Type | Default Lifetime |
---|---|
Access | 3600 seconds (1 hour) |
Refresh | 1209600 seconds (2 weeks) |
Customizing Token Lifetimes
You can adjust token lifetimes by configuring your ClientApplication
resource. Custom token lifetimes are useful when your application has specific security requirements or usage patterns.
Here's how to modify token lifetimes:
const clientApplication = {
resourceType: 'ClientApplication',
// Set access token lifetime to 2 hours (7200 seconds)
accessTokenLifetime: 7200,
// Set refresh token lifetime to 180 days
refreshTokenLifetime: 15552000,
};
Consider your security requirements carefully when adjusting these values. Longer access token lifetimes increase convenience but also increase the window of vulnerability if a token is compromised.
Managing Token Refresh with Grace Periods
The Medplum client includes a token refresh system that helps prevent service interruptions. The system uses a "grace period" to proactively refresh tokens before they expire.
How Grace Periods Work
The grace period represents how long before expiration the client should attempt to refresh the token. By default, this is set to 5 minutes (300,000 milliseconds). For example, if your access token expires at 2:00 PM, the client will attempt to refresh it starting at 1:55 PM.
The Medplum client automatically handles token refresh in three scenarios:
- Before making API requests when the token is within the grace period
- When receiving a 401 Unauthorized response from the server
- When your code explicitly requests a refresh
Note that the grace period mechanism only triggers in the above scenarios.
This means that if your application is idle (not making any API calls), tokens can expire even with a configured grace period. The grace period does not create background refresh tasks.
This is particularly important for mobile applications where the user may not interact with the app for extended periods of time.
For example:
- User logs in at 1:00 PM with a 1-hour access token (expires 2:00 PM)
- Application is idle from 1:30 PM to 2:30 PM
- At 2:30 PM when activity resumes, the token will have expired
To handle this scenario, you should:
- Check authentication status when resuming activity
- Refresh the token if needed before making requests
- Consider increasing the access token lifetime to reduce the frequency of token refreshes
Customizing the Grace Period
You can adjust the grace period when initializing the Medplum client:
// Initialize client with a 10-minute grace period
const customMedplum = new MedplumClient({
refreshGracePeriod: 600000, // 10 minutes in milliseconds
});
// You can also check authentication status with a custom grace period
if (!customMedplum.isAuthenticated(300000)) {
// Token will expire within 5 minutes
await customMedplum.refreshIfExpired();
}
Best Practices for Token Management
-
Use Short-Lived Access Tokens
Keep access token lifetimes short (1-2 hours maximum) to minimize the impact of token theft. The Medplum client's automatic refresh mechanism means you don't need long-lived access tokens for continuous operation.
-
Leverage Automatic Token Refresh
The Medplum client handles token refresh automatically. Configure the grace period appropriately for your application's needs:
const bestPracticesMedplum = new MedplumClient({
refreshGracePeriod: 300000, // 5 minute grace period (default)
}); -
Token Revocation
If you suspect a token has been compromised, revoke it immediately using the
/auth/logout
endpoint. Monitor your audit logs for suspicious activity that might indicate compromised tokens.
Conclusion
For more advanced authentication scenarios, refer to our Authentication reference.