Skip to content

Clarify claims challenge and client application roles#1917

Open
nlykkei wants to merge 1 commit intoMicrosoftDocs:mainfrom
nlykkei:patch-1
Open

Clarify claims challenge and client application roles#1917
nlykkei wants to merge 1 commit intoMicrosoftDocs:mainfrom
nlykkei:patch-1

Conversation

@nlykkei
Copy link

@nlykkei nlykkei commented Mar 16, 2026

No description provided.

@prmerger-automator
Copy link
Contributor

@nlykkei : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

@learn-build-service-prod
Copy link
Contributor

Learn Build status updates of commit 4dc4102:

✅ Validation status: passed

File Status Preview URL Details
docs/identity-platform/claims-challenge.md ✅Succeeded

For more details, please refer to the build report.

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the introductory definitions in the Microsoft identity platform claims challenge article to better describe when claims challenges occur and who needs to handle them.

Changes:

  • Refines the claims challenge definition to reference Conditional Access authentication context and session revocation scenarios.
  • Rewords guidance about who must be prepared to handle claims challenges (from “Applications…” to “Clients of APIs…”).

# Claims challenges, claims requests and client capabilities

A *claims challenge* is a response sent from an API indicating that an access token sent by a client application has insufficient claims. This can be because the token doesn't satisfy the Conditional Access policies set for that API, or the access token has been revoked.
A *claims challenge* is a response sent from an API indicating that an access token sent by a client application has insufficient claims. This can be because the token doesn't satisfy Conditional Access auth context values for that API, or the user's session has been revoked.
A *claims request* is made by the client application to redirect the user back to the identity provider to retrieve a new token with claims that satisfy the other requirements that weren't met.

Applications that use enhanced security features like [Continuous Access Evaluation (CAE)](~/identity/conditional-access/concept-continuous-access-evaluation.md) and [Conditional Access authentication context](https://techcommunity.microsoft.com/blog/identity/granular-conditional-access-for-sensitive-data-and-actions/1751775) must be prepared to handle claims challenges.
Clients of APIs that use enhanced security features like [Continuous Access Evaluation (CAE)](~/identity/conditional-access/concept-continuous-access-evaluation.md) and [Conditional Access authentication context](https://techcommunity.microsoft.com/blog/identity/granular-conditional-access-for-sensitive-data-and-actions/1751775) must be prepared to handle claims challenges.
@ttorble
Copy link
Contributor

ttorble commented Mar 16, 2026

@cilwerner

Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants